منابع مشابه
Legal aspects of Shadow Banking
Shadow Banking system, as an investment method, while being an integral part of the supervised banking system, is a rival for banks and governance institutions in financing and oversight. As a result, its development has created a situation for regulated institutions, which leads to concerns about the legal and regulatory responsibilities of the banking and financial system for investment not g...
متن کاملShadow Insurance
www.SwissFinanceInstitute.ch The Swiss Finance Institute (SFI) is a private foundation created in 2006 by Switzerland’s banking and finance community in cooperation with leading Swiss universities. The Institute supports and advances research, doctoral training, knowledge transfer and education in banking and finance. SFI also fosters interaction between researchers and practitioners with the g...
متن کاملShadow Mapping and Shadow Volumes: Recent Developments in Real-Time Shadow Rendering
In recent years , both Williams’ original Z-buffer shadow mapping algorithm [Williams 1978] and Crow’s shadow volumes [Crow 1977] have seen many variations, additions and enhancements, greatly increasing the visual quality and efficiency of renderings using these techniques. Additionally, the fast evolution of commodity graphics hardware allows for a nearly complete mapping of these algorithms ...
متن کاملShadow Carving
The shape of an object may be estimated by observing the shadows on its surface. We present a method that is robust with respect to a conservative classification of shadow regions. Assuming that a conservative estimate of the object shape is available, we analyze images of the object illuminated with known point light sources taken from known camera locations. We adjust our surface estimate usi...
متن کاملShadow Honeypots
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network or service. Traffic that is considered anomalous is processed by a “shadow honeypot” to determine the accuracy of the anomaly prediction. The shadow is an instance of the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2017
ISSN: 0028-0836,1476-4687
DOI: 10.1038/544264a