JOT 发表于 2025-3-30 11:12:12

http://reply.papertrans.cn/47/4606/460534/460534_51.png

MUTE 发表于 2025-3-30 13:10:29

http://reply.papertrans.cn/47/4606/460534/460534_52.png

不可比拟 发表于 2025-3-30 19:35:48

Marcio Silva Cruz,Ferrucio de Franco Rosa,Mario Jino an altruist willing to reduce his/her own consumption in order to increase the consumption of the care receiver (Becker 1976: 284) as long as doing so increases the care giver’s own utility.. Caring is understood within the economic framework of utility considerations as preference-based choice beh

水汽 发表于 2025-3-30 22:55:15

Daniel Alarcón-Narváez,Fausto A. Jacques García an altruist willing to reduce his/her own consumption in order to increase the consumption of the care receiver (Becker 1976: 284) as long as doing so increases the care giver’s own utility.. Caring is understood within the economic framework of utility considerations as preference-based choice beh

盖他为秘密 发表于 2025-3-31 02:35:32

Alba Nidia Martínez-Martínez,Fausto A. Jacques Garcíand “caring labor” to denote labor performed out of a caring motivation and therefore considered “both objectively and subjectively caring” (Folbre and Weisskopf 1998: 172). According to Nelson (1998) only the care service performed and the imparted feeling of being cared for, i.e. the instrumental a

确定的事 发表于 2025-3-31 08:18:19

http://reply.papertrans.cn/47/4606/460534/460534_56.png

Nucleate 发表于 2025-3-31 09:39:44

http://reply.papertrans.cn/47/4606/460534/460534_57.png

CROAK 发表于 2025-3-31 17:03:35

Classification and Update Proposal for Modern Computer Worms, Based on Obfuscation: species, type, class and evasion. This classification allows a modern computer worm to be categorized in such a way that the main contribution is that it can serve as a model or as a complement to an Information Security Management System (ISMS), in the systems responsible for detecting and/or def

patella 发表于 2025-3-31 19:30:39

Cybersecurity Analysis in Nodes that Work on the DICOM Protocol, a Case Studywith the DICOM protocol among their services, with the execution of a modified experimental design that will allow the discovery of active nodes, discovery of exposed services and vulnerabilities, the analysis of said services as well as their vulnerabilities, their categorization and finally the va

尊重 发表于 2025-4-1 00:06:48

Efficient Design of Underwater Acoustic Sensor Networks Communication for Delay Sensitive Applicatiohat the contention-based random access approach is the most suitable for time-sensitive application where the Network Size (NS) followed by Network Load (NL), Data Rate (DR), and Packet Size (PS), respectively have the strongest impact on delay.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: ITNG 2021 18th International Conference on Information Technology-New Generations; Shahram Latifi Conference proceedings 2021 The Editor(s