نتایج جستجو برای: layered
تعداد نتایج: 33794 فیلتر نتایج به سال:
In this paper we consider the structure and topology of a layered-security model in which the containers and their nestings are given in the form of a rooted tree T . A cyber-security model is an ordered three-tuple M = (T,C, P ) where C and P are multisets of penetration costs for the containers and targetacquisition values for the prizes that are located within the containers, respectively, b...
Abstract. In this paper, a hierarchical system architecture for singleagent multi-modal systems is proposed. The layered system is designed to promote proof obligations so that system specification at one level of granularity conforms with that at another level and vice versa. The design principle for the construction of the hierarchy is based on bisimulation with respect to reachability specif...
Public Good Software’s products match journalistic articles and other narrative content to relevant charitable causes and nonprofit organizations so that readers can take action on the issues raised by the articles’ publishers. Previously an expensive and laborintensive process, application of machine learning and other automated textual analyses now allow us to scale this matching process to t...
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol is layered on top of a secure transport protocol. The model abstracts away from the implementation of the secure transport protocol and just captures the properties that it provides to the Application Layer. We illustrate the usefulness of the model by using it to verify a...
The paper discusses a comprehensive, model-based approach for the design and implementation of intelligent controllers. The system has been implemented in the framework of the Multigraph Architecture. The Multigraph Architecture is a layered system, which includes a parallel, graph computation model, the corresponding execution environment, and software tools supporting the interactive, graphic...
A multiple access relay channel (MARC) is considered in which an analogue-like network coding is implemented in the relay node. This analogue coding is a simple addition of the received signals at the relay node. Using “nulling detection” structure employed in V-BLAST receiver, we propose a detection scheme in the destination which is able to provide a diversity order of two for all users. We a...
A robust layered control system for a mobile robot. Brooks, R. 1985. [1] A layered architecture for office delivery robots. Simmons, R. 1997. [2]
Layered dielectric media is encountered in many electromagnetic problems such as analysis of multi-layered substrate/superstrate microwave circuits and printed antennas as well as modeling the terrain with a dielectric stratified medium. In this section a procedure for evaluating the dyadic Green’s function for a multi-layered (with planar interfaces) medium with arbitrary positions of the sour...
Mafic and ultramafic layered rocks located in south of Orzuieh (Baft, Kerman province), consist of plagioclase bearing ultramafic rocks (including olivine, orthopyroxene , clinopyroxene and plagioclase), olivine gabbros (including plagioclase, olivine, orthopyroxene and clinopyroxene) and gabbronorites (including plagioclase, orthopyroxene and clinopyroxene and amphibole) and constitute the maf...
When security of a given network architecture is not properly designed from the beginning, it is difficult to preserve confidentiality, authenticity, integrity and nonrepudiation in practical networks. Unlike traditional mobile wireless networks, ad hoc networks rely on individual nodes to keep all the necessary interconnections alive. In this article we investigate the principal security issue...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید