affected 发表于 2025-3-21 17:27:29

书目名称E-Business and Telecommunications影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0300021<br><br>        <br><br>书目名称E-Business and Telecommunications读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0300021<br><br>        <br><br>

低位的人或事 发表于 2025-3-21 20:37:06

Multipath Forwarding in Named Data Networking: Flow, Fairness, and Context-Awarenessis paper, we elicit essential requirements for forwarding strategies and show that existing strategies struggle to fully fulfill these requirements. After that, we investigate how to unlock the full capabilities of NDN by enabling the consideration of context information in the forwarding plane. In

PHON 发表于 2025-3-22 03:39:32

http://reply.papertrans.cn/31/3001/300021/300021_3.png

Incisor 发表于 2025-3-22 07:55:55

http://reply.papertrans.cn/31/3001/300021/300021_4.png

厚脸皮 发表于 2025-3-22 10:55:09

http://reply.papertrans.cn/31/3001/300021/300021_5.png

Headstrong 发表于 2025-3-22 14:17:12

http://reply.papertrans.cn/31/3001/300021/300021_6.png

Headstrong 发表于 2025-3-22 18:49:01

http://reply.papertrans.cn/31/3001/300021/300021_7.png

钉牢 发表于 2025-3-23 00:14:01

http://reply.papertrans.cn/31/3001/300021/300021_8.png

Tincture 发表于 2025-3-23 04:04:45

Hardware Implementation of HS1-SIVn this paper. Given implementation of HS1-SIV cipher was developed in such a way to be conforming to the specification of the authenticated cipher as well as a hardware API. The implemented API is conforming to the specifications of the GMU Hardware API for authenticated ciphers. The VHDL implementa

细丝 发表于 2025-3-23 07:38:15

Runtime Classification of Mobile Malware for Resource-Constrained Devicesof existing malware are challenging tasks and most of the currently proposed solutions are focused on only one of the mentioned aspects..In this work, we propose a solution that is able to detect malware that appears at runtime and, at the same time, provides useful information to discriminate betwe
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: E-Business and Telecommunications; 13th International J Mohammad S. Obaidat Conference proceedings 2017 Springer International Publishing A