نتایج جستجو برای: compromising approach
تعداد نتایج: 1299112 فیلتر نتایج به سال:
The Wired Equivalent Privacy (WEP) option to the 802.11 standard is the first step in addressing security concerns; it is an encryption provision. WEP is a security protocol designed to provide a wireless local area network with a level of security and privacy comparable to what is usually expected of a wired network. However since physical security mechanisms no longer apply, the goal of the a...
To achieve acceptable query response times in data warehouse environments, the data have to be pre-aggregated according to the need of the applications and stored redundantly. These materialized views must be kept up to date, to assure their usability. In this paper we present an algorithm which improves the maintenance of materialized views in two ways. In the first place, the maintenance proc...
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak ...
The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual's genome or personal genomics have recently gained much interest. One such application is the identification of relativ...
This paper presents a new approach for measuring dielectric properties of materials. The proposed approach is based on applying the synthetic time domain reflectometry to a dielectric filled waveguide. The compromising measurement results show that this algorithm can be successfully applied for measuring other parameters of the materials. Also, the approach has been successfully applied to dete...
This paper presents a logical system, CIULDS, as a labelled realization to our approach of Compromising Interfering Updates. The approach proposes a method for handling logically con icting inputs into knowledge bases, via restricting their consequences. The main idea is to update the database with as many consistent consequences of the inputs as possible, in the case that the inputs themselves...
This paper presents a novel fingerprint classifier fusion algorithm using Dempster-Shafer theory concomitant with update rule. The proposed algorithm accurately matches fingerprint evidences and also efficiently adapts to dynamically evolving database size without compromising accuracy or speed. We experimentally validate our approach using three fingerprint recognition algorithms based on minu...
Terahertz dual frequency comb spectroscopy (THz-DFCS) yields high spectral resolution without compromising bandwidth. Nonetheless, the resolution of THz-DFCS is usually limited by the laser repetition rate, which is typically between 80 MHz and 1 GHz. In this paper, we demonstrate a new method to achieve sub-repetition rate resolution in THz-DFCS by adaptively modifying the effective laser repe...
Due to the increasing scale, complexity, dynamicity and heterogeneity of modern software systems, it is not feasible to solely rely upon human management to guarantee a good service level with such availability demand. Self-managing systems are needed as an effective approach to deal with those issues by exploiting adaptive techniques to adjust a system. On top of that, model-based adaptation i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید