长矛 发表于 2025-3-27 00:26:16

Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart Devices, we present an adaptive transformation engine to efficiently support smooth multi-screen services using smart devices. The proposed engine dynamically adapts user interfaces to make it suitable for smart devices. In addition, it supports real-time media transcoding and streaming so as to provide these devices with suitable media contents.

STELL 发表于 2025-3-27 01:29:56

http://reply.papertrans.cn/24/2339/233802/233802_32.png

无畏 发表于 2025-3-27 08:29:39

http://reply.papertrans.cn/24/2339/233802/233802_33.png

Cumbersome 发表于 2025-3-27 10:04:58

Research on Privacy Protection of WHOIS Information in DNS,IS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the experimental results it can be seen that the protection method can better protect the privacy of WHOIS information in DNS.

ARY 发表于 2025-3-27 16:54:51

http://reply.papertrans.cn/24/2339/233802/233802_35.png

Bronchial-Tubes 发表于 2025-3-27 18:06:01

Conference proceedings 2015s a comprehensive conference focused on the various aspects of advances in engineering systems in computer science, and applications, including ubiquitous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and wi

绅士 发表于 2025-3-27 23:47:20

1876-1100 ng Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application..978-3-662-51619-5978-3-662-45402-2Series ISSN 1876-1100 Series E-ISSN 1876-1119

值得 发表于 2025-3-28 02:10:47

http://reply.papertrans.cn/24/2339/233802/233802_38.png

职业拳击手 发表于 2025-3-28 09:06:45

Changing Economic Environment in Asiaropose a secrecy multiplication based on Shamir’s (k, n)-threshold secret-sharing scheme that uses only . servers. Through this scheme, the system can realize secrecy calculation without altering the threshold level.

TAP 发表于 2025-3-28 14:29:29

The Asian Conglomerates at a Crossroadsmotion data for correct classification purpose. We discovered that the trained weights and bios from the neural network based on three limbs parts measurement data has allowed us to differentiate fall from regular walk motion with high accuracy.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Computer Science and its Applications; Ubiquitous Informati James J. (Jong Hyuk) Park,Ivan Stojmenovic,Gangman Conference proceedings 2015