AG¹«Ë¾¿Æ¼¼¿ÆÑÐЧ¹ûÁÁÏà¹ú¼Ê½¹µãÆÚ¿¯ÓëѧÊõ¾Û»á
2020-04-25
¿ËÈÕ£¬AG¹«Ë¾¿Æ¼¼ÐÇÔÆÊµÑéÊÒÈÏÕæÈËÁõÎÄí®²©Ê¿¡¢ÌìÊàʵÑéÊҹ˶ž격ʿºÍ·üӰʵÑéÊÒÈÏÕæÈËÎâÌú¾üµÄÇå¾²Ñо¿ÀàÂÛÎÄÊÕµ½ÆÚ¿¯ºÍ¾Û»áµÄ¼ȡ֪ͨ£¬Êܵ½È«ÇòȨÍþѧÊõ½çµÄÈϿɣ¬ÎªAG¹«Ë¾¿Æ¼¼ÏíÓþº£ÄÚÍâµÄÇå¾²Ñо¿ÄÜÁ¦Ìíש¼ÓÍß¡£
No.1
ÔÆÅÌËãÁìÓòµÄ¹ú¼ÊѧÊõÆÚ¿¯¡¶IEEE Transactions on Cloud Computing¡·
»ùÓÚAG¹«Ë¾¿Æ¼¼“öïÅô”»ù½ðУÆóÏàÖúµÄÑо¿Ð§¹û£¬ÐÇÔÆÊµÑéÊÒÈÏÕæÈËÁõÎÄí®²©Ê¿Ó뻪ÖпƼ¼´óѧлÓêÀ´ÏÈÉúÍŽáÐû²¼ÃûΪ¡¶Real-time Prediction of Docker Container Resource Load Based on A Hybrid Model of ARIMA and Triple Exponential Smoothing¡·µÄÂÛÎÄÊÕ¼ÓÚÔÆÅÌËãÁìÓòµÄ¹ú¼ÊѧÊõÆÚ¿¯¡¶IEEE Transactions on Cloud Computing¡·£¬¸ÃÆÚ¿¯ÌṩÓйØÔÆÅÌËãËùÓÐÁìÓòµÄÁ¢ÒìÑо¿Ë¼Ð÷ºÍÓ¦ÓÃЧ¹û¡£Ö÷Ìâ¾Û½¹ÓÚÐÂÓ±ÀíÂÛ¡¢Ëã·¨¡¢ÐÔÄÜÆÊÎöµÈÓëÔÆÅÌËãÁìÓòÏà¹ØµÄÊÖÒÕÓ¦Óá£×èÖ¹ÏÖÔÚ£¬Öйú¿ÆÑ§Ôº¹Ù·½ÎÄÏ×ÖÐÐÄÈÏÖ¤¸ÃÆÚ¿¯ÎªSCIÆÚ¿¯¡£
No.2
SCIÆÚ¿¯¡¶Computer Communications¡·
ÌìÊàʵÑéÊҹ˶ž격ʿÓëÇ廪´óѧ¡¢Öйú¿ÆÑ§Ôº´óѧµÄÏÈÉúÃÇÍŽáÐû²¼ÃûΪ¡¶Modeling IPv6 Adoption from Biological Evolution¡·µÄÂÛÎÄÊÕ¼ÓÚSCIÆÚ¿¯¡¶Computer Communications¡·¡£¸ÃÆÚ¿¯¾Û½¹ÓÚÅÌËã»úºÍµçÐÅÊÖÒÕÁìÓòµÄÏÖʵÉú³¤£¬½ÒÏþÊý¾ÝͨѶÏà¹ØµÄÑо¿ÀàºÍÓ¦ÓÃÀàÂÛÎļ°°¸Àý¡£×èÖ¹ÏÖÔÚ£¬Öйú¿ÆÑ§Ôº¹Ù·½ÎÄÏ×ÖÐÐÄÈÏÖ¤¸ÃÆÚ¿¯ÎªSCIÆÚ¿¯¡£
No.3
IEEE Cyber Science 2020 Conference
·üӰʵÑéÊÒÈÏÕæÈËÎâÌú¾üÓëÓ¢¹úÊ¥°²µÂ³˹´óѧÍõÔ̼Ѳ©Ê¿¹²½ÒÏþÁ½ÆªÂÛÎÄ£¬»®·ÖΪ¡¶Cost Effective OCR Implementation to Prevent Phishing on Mobile Platforms¡· ºÍ¡¶ISP Hijacking Protection via DOM Tree Comparison¡·£¬Á½ÆªÎÄÕ¾ù±»IEEE Cyber Science 2020 Conference¼ȡ¡£
Cyber Science¾Û»áÊÇÓÉIEEEÌᳫµÄ¶àѧ¿ÆÑо¿¡¢Á¢ÒìÓëÏàÖúÖÐÐÄ£¨C-MRiC£©µÄÆì½¢¾Û»á£¬×ÅÁ¦ÓÚÍøÂçÌ¬ÊÆ¸ÐÖª¡¢É罻ýÌå¡¢ÍøÂçÇå¾²ºÍÍøÂçÊÂÎñÏìÓ¦·½ÃæµÄ¿ªÍØÐÔÑо¿ºÍÁ¢Òì¡£2020Ä꣬Cyber Science¾Û»á½«ÔÚ°®¶ûÀ¼µÄ¶¼°ØÁÖ¶¼»á´óѧ¾ÙÐС£ÒßÇéÔµ¹ÊÔÓÉ£¬Cyber Science¾Û»áÒѾ¸ÄÎªÔÆ¶Ë¾Û»á£¬½ìʱ½«¶ÔÁ½ÆªÂÛÎľÙÐо«²Ê½â˵¡£

AG¹«Ë¾ÔÆ







