中图分类
执行
    会议名称
    执行
    中文(共0篇) 外文(共4590篇)
    排序:
    导出 保存至文件
    [会议]   Ya-Wen Yang   Eric Hsueh-Chan Lu        IEEE International Conference on Advanced Logistics and Transport        2017年6th届      共 6 页
    摘要 : With the blossoming of online shopping, a lot of goods need be distributed to customers. For a logistics company, how to improve the delivery efficiency, reduce the logistics cost and satisfy the real logistical constraints includ... 展开
    关键词 : Logistics   Windows   Vehicles   Law   Microsoft Windows    

    摘要 : With the blossoming of online shopping, a lot of goods need be distributed to customers. For a logistics company, how to improve the delivery efficiency, reduce the logistics cost and satisfy the real logistical constraints includ... 展开
    关键词 : Logistics   Windows   Vehicles   Law   Microsoft Windows  

    [会议]   Jose Oliveira   Miguel Frade   Pedro Pinto        International Conference on Internet of Things, Big Data and Security        2018年3rd届      共 7 页
    摘要 : Security attacks using USB interfaces and devices are becoming more advanced, which boost efforts to develop counter measures in order to protect systems and data. One of the most recent attacks using USB devices is the BadUSB att... 展开
    关键词 : USB   BadUSB   Microsoft windows  

    摘要 : Computer security has always been an issue in gigantic as well as small-sized businesses. A major realm of security breach in such firms is a poor privileged access, adjustment or occasionally fakes of critical business, or user i... 展开
    关键词 : Microsoft Windows   Password   Linux    

    摘要 : Computer security has always been an issue in gigantic as well as small-sized businesses. A major realm of security breach in such firms is a poor privileged access, adjustment or occasionally fakes of critical business, or user i... 展开
    关键词 : Microsoft Windows   Password   Linux  

    摘要 : To achieve the privacy-enhancing authentications without any TTP (Trusted Third Party), blacklistable anonymous credential systems have been proposed. In conventional blacklistable anonymous credential systems, a user is blacklist... 展开

    摘要 : To achieve the privacy-enhancing authentications without any TTP (Trusted Third Party), blacklistable anonymous credential systems have been proposed. In conventional blacklistable anonymous credential systems, a user is blacklist... 展开

    摘要 : This paper presents a co-simulation of the different parameters which affect the illuminance inside a working environment. A key factor in this analysis is the daylight illuminance that penetrates into the building skin and the va... 展开
    关键词 : Lighting   Manuals   Windows   Sun   Azimuth   Microsoft Windows    

    摘要 : This paper presents a co-simulation of the different parameters which affect the illuminance inside a working environment. A key factor in this analysis is the daylight illuminance that penetrates into the building skin and the va... 展开
    关键词 : Lighting   Manuals   Windows   Sun   Azimuth   Microsoft Windows  

    [会议]   Stanislav Darula   Richard Kittler        Lighting Conference of the Visegrad Countries        2018年7th届      共 5 页
    摘要 : Nowadays daylight apertures in buildings are designed on the bases of overcast sky conditions in wintertime in Slovakia and Czech Republic. The criterion is the relative value of the Daylight Factor in its average 0.9% in two refe... 展开

    研究趋势
    相关热图
    学科分类