نتایج جستجو برای: layered
تعداد نتایج: 33794 فیلتر نتایج به سال:
ion and Refinement of Layered Security Policy by Marshall Abrams and David Bailey
Layered representations, originally introduced in 7] are important in several applications. Speciically, they are very appropriate for object tracking, object manipulation and content-based scalability which are among the main functionalities of the future standard MPEG-4 2, 3]. A robust representation of moving images based on layers has been presented in 5]. One of the most crucial stages in ...
To find a configuration of a distributed system satisfying performance goals is a complex search problem that involves many design parameters, like hardware selection, job distribution and process configuration. Performance models are a powerful tools to analyse potential system configurations, however, their evaluation is expensive, such that only a limited number of possible configurations ca...
Publish/Subscribe is often regarded as a promising paradigm for Future Internet architectures. Its information oriented nature and its particular security features have stimulated current research efforts which aim at applying publish/subscribe principles to a clean-slate Internet architecture. One of the core components of publish/subscribe architectures is the rendezvous network. Any security...
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128. This algorithm was not selected for second phase evaluation of NESSIE project due to implementation and processing cost. In this paper we present relatively a fast implementation of the cipher using Texas Instrument’s DSP C64x+.
In this article, we present different space-time receive processing techniques for frequency selective multiple input multiple output (MIMO) channels and evaluate their performance. We present the solutions for linear zem-forcing (ZF) and Wenerfil ter (WF) equalization with latency time optimization and incorporate the Bell Laboratories Layered Space Time (BLAST) architecture to gain diversity....
This paper describes a high-level approach for our improved Cloud Computing Adoption Framework update 1 (CCAF 1.1), which emphasizes on the security policies, recommendations, techniques and technologies to be updated in our framework. Motivation, background, security overview and recent attack methods have been discussed. We propose a solution based on arising needs to improve current Cloud se...
This document describes the Asynchronous Layered Coding (ALC) protocol, a massively scalable reliable content delivery protocol. Asynchronous Layered Coding combines the Layered Coding Transport (LCT) building block, a multiple rate congestion control building block and the Forward Error Correction (FEC) building block to provide congestion controlled reliable asynchronous delivery of content t...
In the present study, dormancy and germination requirements were investigated in seeds of Citrullus colocynthis (L.). Seeds were subjected to 10 pretreatments in the present study. These pretreatments included hot water (100° C) followed by the seeds placed between double layered filter paper moistened with 5 ml of distilled water and kept at 28 - 30 °C, sulphuric acid (98% v/v), for 30 min fo...
In this article, the results of a study on energy absorption characteristics of foam-filled thin-walled structures with finite element analysis have been presented. Four specimens of thin walled structures have been filled with uniform foam and three specimens have been filled with linear four-layered foam. Also, eight layers HLH (High-Low-High) and eight layers LHL (Low-High-Low) have been sim...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید