نتایج جستجو برای: strong inclusion

تعداد نتایج: 493736  

2015
Ijlal Loutfi Audun Jøsang

Consuming services online is an exponentially growing trend within different industries. A robust online authentication solution to these services is a critical requirement for establishing trust between end users and service providers. Currently, the shortcomings of password based authentication solutions are well recognized.Hence, many alternative strong authentication solutions are being ado...

2010
A. Razani

Let X be a reflexive Banach space which has a weakly sequentially continuous duality mapping. In this paper, we consider the following viscosity approximation sequence x n λ n fx n 1−λ n T n x n , where λ n ∈ 0, 1, {T n } is a uniformly asymptotically regular sequence, and f is a weakly contractive mapping. Strong convergence of the sequence {x n } is proved.

Journal: :European Journal of Operational Research 2000
Xinmin Yang X. Q. Yang Kok Lay Teo

A pair of Wolfe type non-differentiable second order symmetric primal and dual problems in mathematical programming is formulated. The weak and strong duality theorems are then established under second order F-convexity assumptions. Symmetric minimax mixed integer primal and dual problems are also investigated. 2002 Elsevier Science B.V. All rights reserved.

2013
Igor Bjelakovic Holger Boche Jochen Sommerfeld

In this work the arbitrarily varying wiretap channel AVWC is studied. We derive a lower bound on the random code secrecy capacity for the average error criterion and the strong secrecy criterion in the case of a best channel to the eavesdropper by using Ahlswede’s robustification technique for ordinary AVCs. We show that in the case of a non-symmetrisable channel to the legitimate receiver the ...

Journal: :Discussiones Mathematicae Graph Theory 2008
Martin Sonntag Hanns-Martin Teichert

If D = (V,A) is a digraph, its competition hypergraph CH(D) has the vertex set V and e ⊆ V is an edge of CH(D) iff |e| ≥ 2 and there is a vertex v ∈ V , such that e = {w ∈ V |(w, v) ∈ A}. We tackle the problem to minimize the number of strong components in D without changing the competition hypergraph CH(D). The results are closely related to the corresponding investigations for competition gra...

Journal: :Int. J. IT Standards and Standardization Res. 2007
Krzysztof Brzezinski

In 2006, businesses engaged in Internet commerce face a fundamental challenge when trying to implement strong authentication technologies because of the absence of widely accepted standards for the reliable authentication of transacting parties in Internet commerce. For more than a decade, governments have struggled unsuccessfully to create legal frameworks within which businesses can implement...

2010
Jeffrey S. Leon

This paper deals with the problem of finding a base and strong generating set for the group generated by a given set of permutations. The concepts of base and strong generating set were introduced by Sims [5], [6] and provide the most effective tool for computing with permutation groups of high degree. One algorithm, originally proposed by Sims [7], is described in detail; its behavior on a num...

2007
Paul Witman

The United States banking industry was directed by its regulatory agencies to provide authentication stronger than single factor for “high risk” transactions, as a defense against phishing, by year-end 2006. Financial institutions had a wide array of options available to them to meet this requirement, and there was considerable latitude in how to interpret the regulatory guidance. This paper pr...

2002
PETER A. HÄSTÖ

We study a certain monotonicity property of ratios of means, which we call a strong inequality. These strong inequalities were recently shown to be related to the so-called relative metric. We also use the strong inequalities to derive new ordinary inequalities. The means studied are the extended mean value of Stolarsky, Gini’s mean and Seiffert’s mean.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید