نتایج جستجو برای: compromising approach

تعداد نتایج: 1299112  

2001
Kimberly A. Buck

The Wired Equivalent Privacy (WEP) option to the 802.11 standard is the first step in addressing security concerns; it is an encryption provision. WEP is a security protocol designed to provide a wireless local area network with a level of security and privacy comparable to what is usually expected of a wired network. However since physical security mechanisms no longer apply, the goal of the a...

1998
Michael Teschke Achim Ulbrich

To achieve acceptable query response times in data warehouse environments, the data have to be pre-aggregated according to the need of the applications and stored redundantly. These materialized views must be kept up to date, to assure their usability. In this paper we present an algorithm which improves the maintenance of materialized views in two ways. In the first place, the maintenance proc...

Journal: :CoRR 2010
Pere Manils Chaabane Abdelberi Stevens Le Blond Mohamed Ali Kâafar Claude Castelluccia Arnaud Legout Walid Dabbous

Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak ...

Journal: :Genome research 2014
Dan He Nicholas A Furlotte Farhad Hormozdiari Jong Wha J Joo Akshay Wadia Rafail Ostrovsky Amit Sahai Eleazar Eskin

The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual's genome or personal genomics have recently gained much interest. One such application is the identification of relativ...

2007
G. Moradi A. Abdipour

This paper presents a new approach for measuring dielectric properties of materials. The proposed approach is based on applying the synthetic time domain reflectometry to a dielectric filled waveguide. The compromising measurement results show that this algorithm can be successfully applied for measuring other parameters of the materials. Also, the approach has been successfully applied to dete...

1996
Fátima C. C. Dargam

This paper presents a logical system, CIULDS, as a labelled realization to our approach of Compromising Interfering Updates. The approach proposes a method for handling logically con icting inputs into knowledge bases, via restricting their consequences. The main idea is to update the database with as many consistent consequences of the inputs as possible, in the case that the inputs themselves...

Journal: :IEICE Electronic Express 2006
Richa Singh Mayank Vatsa Afzel Noore Sanjay K. Singh

This paper presents a novel fingerprint classifier fusion algorithm using Dempster-Shafer theory concomitant with update rule. The proposed algorithm accurately matches fingerprint evidences and also efficiently adapts to dynamically evolving database size without compromising accuracy or speed. We experimentally validate our approach using three fingerprint recognition algorithms based on minu...

Journal: :Optics express 2016
Francisco S Vieira Flavio C Cruz David F Plusquellic Scott A Diddams

Terahertz dual frequency comb spectroscopy (THz-DFCS) yields high spectral resolution without compromising bandwidth. Nonetheless, the resolution of THz-DFCS is usually limited by the laser repetition rate, which is typically between 80 MHz and 1 GHz. In this paper, we demonstrate a new method to achieve sub-repetition rate resolution in THz-DFCS by adaptively modifying the effective laser repe...

2011
Pedro Rodrigues Emil C. Lupu

Due to the increasing scale, complexity, dynamicity and heterogeneity of modern software systems, it is not feasible to solely rely upon human management to guarantee a good service level with such availability demand. Self-managing systems are needed as an effective approach to deal with those issues by exploiting adaptive techniques to adjust a system. On top of that, model-based adaptation i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید