用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: ITNG 2021 18th International Conference on Information Technology-New Generations; Shahram Latifi Conference proceedings 2021 The Editor(s

[复制链接]
楼主: GERD847
发表于 2025-3-30 11:12:12 | 显示全部楼层
发表于 2025-3-30 13:10:29 | 显示全部楼层
发表于 2025-3-30 19:35:48 | 显示全部楼层
Marcio Silva Cruz,Ferrucio de Franco Rosa,Mario Jino an altruist willing to reduce his/her own consumption in order to increase the consumption of the care receiver (Becker 1976: 284) as long as doing so increases the care giver’s own utility.. Caring is understood within the economic framework of utility considerations as preference-based choice beh
发表于 2025-3-30 22:55:15 | 显示全部楼层
Daniel Alarcón-Narváez,Fausto A. Jacques García an altruist willing to reduce his/her own consumption in order to increase the consumption of the care receiver (Becker 1976: 284) as long as doing so increases the care giver’s own utility.. Caring is understood within the economic framework of utility considerations as preference-based choice beh
发表于 2025-3-31 02:35:32 | 显示全部楼层
Alba Nidia Martínez-Martínez,Fausto A. Jacques Garcíand “caring labor” to denote labor performed out of a caring motivation and therefore considered “both objectively and subjectively caring” (Folbre and Weisskopf 1998: 172). According to Nelson (1998) only the care service performed and the imparted feeling of being cared for, i.e. the instrumental a
发表于 2025-3-31 08:18:19 | 显示全部楼层
发表于 2025-3-31 09:39:44 | 显示全部楼层
发表于 2025-3-31 17:03:35 | 显示全部楼层
Classification and Update Proposal for Modern Computer Worms, Based on Obfuscation: species, type, class and evasion. This classification allows a modern computer worm to be categorized in such a way that the main contribution is that it can serve as a model or as a complement to an Information Security Management System (ISMS), in the systems responsible for detecting and/or def
发表于 2025-3-31 19:30:39 | 显示全部楼层
Cybersecurity Analysis in Nodes that Work on the DICOM Protocol, a Case Studywith the DICOM protocol among their services, with the execution of a modified experimental design that will allow the discovery of active nodes, discovery of exposed services and vulnerabilities, the analysis of said services as well as their vulnerabilities, their categorization and finally the va
发表于 2025-4-1 00:06:48 | 显示全部楼层
Efficient Design of Underwater Acoustic Sensor Networks Communication for Delay Sensitive Applicatiohat the contention-based random access approach is the most suitable for time-sensitive application where the Network Size (NS) followed by Network Load (NL), Data Rate (DR), and Packet Size (PS), respectively have the strongest impact on delay.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-2 23:06
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表