清醒 发表于 2025-3-23 10:48:50

Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and Pricing calculation methods to determine the optimal order quantity and optimal sales price. Model in this paper is an extension of existing models, while the known model is a special case of this model. At last an simple example is given.

Addictive 发表于 2025-3-23 14:32:36

http://reply.papertrans.cn/47/4651/465013/465013_12.png

针叶类的树 发表于 2025-3-23 19:45:29

Method for Evaluating QoS Trustworthiness in the Service Composition the dependent relation between estimated QoS and the environmental context effectively, and can insure the accuracy of trustworthiness evaluation. Meantime, the proposed service selection approach can improve the actual runtime performance of the selected service.

tinnitus 发表于 2025-3-24 00:58:52

Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairingsent than previous solutions in terms of communication complexity. In addition to the semantic security, we also present the authentication security to resist the undetectable on-line dictionary attacks.

MENT 发表于 2025-3-24 03:42:04

Bayesian Network Based on FTA for Safety Evaluation on Coalmine Haulage Systemion Ltd. Through the result of the analysis we point out the most important factors influencing the safety state. The corresponding countermeasures are put forward too. The evaluation result indicates that this method is easy and can be popularized.

Formidable 发表于 2025-3-24 09:48:42

Short Signature from the Bilinear Pairingscheme has short public parameters and the size of the signature achieves 160 bits. In addition, under the .-Exponent Computational Diffie-Hellman Problem(.-CDH), the new scheme is provable security. To the best of authors knowledge, this is the first scheme whose signature size achieves 160 bits based on the bilinear pairing.

cartilage 发表于 2025-3-24 12:58:31

The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithmsss in the field of individual credit risk assessment. So we constructed a practical method based on combined algorithms, and we tested it empirically. The result shows that the application of the method can achieve better accuracy than the BP neural network.

露天历史剧 发表于 2025-3-24 15:47:44

http://reply.papertrans.cn/47/4651/465013/465013_18.png

头盔 发表于 2025-3-24 21:47:00

Leyou Zhang,Yupu Hu,Qing Wumanagement; and establish their own ethical and governance principles, applicable to the Board of Directors..Based on an extensive data base, collected painstakingly over five years, this book offers new insigh978-3-030-48529-0978-3-030-48527-6

stratum-corneum 发表于 2025-3-25 00:40:35

http://reply.papertrans.cn/47/4651/465013/465013_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information Computing and Applications; First International Rongbo Zhu,Yanchun Zhang,Chunfeng Liu Conference proceedings 2010 Springer Ber