NUDGE 发表于 2025-3-23 12:26:43

http://reply.papertrans.cn/48/4714/471365/471365_11.png

PON 发表于 2025-3-23 15:29:53

Zhihao Zheng,Pu Wangnd die Werkzeugkosten deutlich geringer als beim Verfahren nach Busch. Bei gegebener Druckringkraft traten mit den größeren Abstreckwinkeln Reißer auf, woraus der gleiche Einfluß des Abstreckwinkels auf die Verfahrensgrenze wie beim konventionellen Abstreckgleitziehen /65/ abzuleiten ist.

运气 发表于 2025-3-23 20:32:28

http://reply.papertrans.cn/48/4714/471365/471365_13.png

lipoatrophy 发表于 2025-3-23 22:25:08

An Efficient Authentication Protocol for RFID-Based Supply Chainsntication named StepAuth in which the readers don’t need to preload any valid paths before authentication. StepAuth reduces the risks of leaking valid paths. In this paper, we propose a new tag path authentication protocol for RFID-based supply chain, which further improves the efficiency of StepAut

recede 发表于 2025-3-24 05:40:07

A Transfer Learning Approach for Credit Scoring auxiliary training data transfer so that the efficiency of external credit information using minority samples can be improved. With a new sample initial weight allocation and adjustment strategy, the ability to identify negative samples is highlighted. Through dynamic adjustments to auxiliary train

Credence 发表于 2025-3-24 09:37:32

A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processorhe CPU-FPGA heterogeneous system which can be used as cluster cloud computing node. Meanwhile, we make a comparison of our model with other references and verify the efficient of the programming model in this paper.

annexation 发表于 2025-3-24 12:48:32

A Gaussian-Based Trust Model for Nodes of Sensor Networks automatic credibility state and the credibility monitoring across the Internet can be realized. From the simulation analysis, it can be judged that GBTM has higher accuracy and dynamic adaptability compared with other known trust models.

过份艳丽 发表于 2025-3-24 18:51:12

http://reply.papertrans.cn/48/4714/471365/471365_18.png

汇总 发表于 2025-3-24 21:30:00

Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items, the graph-based model and the content-based model. We compare the algorithms commented before on Top-N recommendation tasks and evaluate their performance on recommending long-tail items. Experimental results support the effect of factor analysis for various tasks.

Dissonance 发表于 2025-3-25 03:05:36

http://reply.papertrans.cn/48/4714/471365/471365_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018; Applications and Tec Jemal Abawajy,Ki