نتایج جستجو برای: multilevel security

تعداد نتایج: 204436  

2007
S. Serra Capizzano

Optimal preconditioners (those that provide a proper cluster at 1) are very important for the cg-like methods since they make them converge superlinearly. As is well known, for Toeplitz matrices generated by a continuous symbol, many circulant and circulant-like (related to different matrix algebras) preconditioners were proved to be optimal. In contrast, for multilevel Toeplitz matrices, there...

2007
Piotr Winkielman Brian Knutson Martin Paulus Jennifer L. Trujillo

This article reviews psychological accounts of affective influence on judgments and decisions and argues that these accounts can be enriched by insights from biopsychology. The authors show how biopsychological research helps (1) reveal the sources of values and feelings; (2) predict when affect will influence attentional, perceptual, memorial, and decision processes; and (3) identify precise m...

2005
Inja Youn Csilla Farkas Bhavani M. Thuraisingham

Two-way group voice communications, otherwise known as teleconferencing are common in commercial and defense networks. One of the main features of military teleconferences is the need to provide means to enforce the Multilevel Security (MLS) model. In this paper we propose an architecture and protocols facilitating MLS conferences over Public Switched Telephone Network (PSTN). We develop protoc...

Journal: :CoRR 2017
Tom Adam Frederic Anderson David M. W. Powers

We report investigations into speaker classification of larger quantities of unlabelled speech data using small sets of manually phonemically annotated speech. The Kohonen speech typewriter [1] is a semi-supervised method comprised of selforganising maps (SOMs) that achieves low phoneme error rates. A SOM is a 2D array of cells that learn vector representations of the data based on neighbourhoo...

Journal: :CoRR 2016
Qiyang Zhao Lewis D. Griffin

It is well accepted that image segmentation can benefit from utilizing multilevel cues. The paper focuses on utilizing the FCNN-based dense semantic predictions in the bottom-up image segmentation, arguing to take semantic cues into account from the very beginning. By this we can avoid merging regions of similar appearance but distinct semantic categories as possible. The semantic inefficiency ...

2012
Ruben Rios Jose Antonio Onieva Javier López

Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in multilevel security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. We analyze a protocol extensively used today, the Dynamic Host Configuration Protocol (DHCP), in s...

1992
Oliver Costich John P. McDermott

A user of a database management system has an intuitive idea of a transaction as a sequence of database commands that he or she submits. The user expects this sequence of commands to be executed in the order of submission, without interference from other database commands submitted by other users. Techniques for doing this while concurrently supporting multiple database users are well known for...

Journal: :International Journal of Computer Applications 2013

Journal: :Journal of Social and Political Psychology 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید