Recommendations for deploying multidimensio
نویسندگان
چکیده
منابع مشابه
Deploying Hashes Deploying New Hash Functions
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discov eries. Regardless of whether or not it is necessary to move away from those now, it is clear that it will be necessary to do so in the not-too-distant future. This poses a number of challenges, especially for certificate-based protocols. We analyze a number of protocols, including S/...
متن کاملDeploying SDP for machine learning
We discuss the use in machine learning of a general type of convex optimisation problem known as semi-definite programming (SDP) [1]. We intend to argue that SDP’s arise quite naturally in a variety of situations, accounting for their omnipresence in modern machine learning approaches, and we provide examples in support.
متن کاملIncentives for Deploying Secure Routing
The Internet’s routing and forwarding infrastructure is vulnerable to attacks and misconfigurations that threaten the ability of hosts to communicate. Attacks that inject false information into BGP or compromise a router on the data path can impair data confidentiality & integrity, and disrupt a destination’s network availability. Proposals to secure BGP have existed for nearly a decade (s-BGP ...
متن کاملDo Patient Preferences Influence Surgeon Recommendations for Treatment?
Background: When the best treatment option is uncertain, a patient’s preference based on personal values should bethe source of most variation in diagnostic and therapeutic interventions. Unexplained surgeon-to-surgeon variation intreatment for hand and upper extremity conditions suggests that surgeon preferences have more influence than patientpreferences.Methods: A total of 184 surgeons revie...
متن کاملAn analytical simulator for deploying IP telephony
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task. This paper describes an analytical design and planning simulator to assess the readiness of existing IP networks for the deployment of VoIP. The analytical simulator utilizes techniques used for network flows and queueing network analysis to compute two key performance bounds for VoIP: delay and bandwidth. The simul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informacionno-technologicheskij vestnik
سال: 2017
ISSN: 2409-1650
DOI: 10.21499/2409-1650-2017-1-68-80