نتایج جستجو برای: evaluation schemes
تعداد نتایج: 919945 فیلتر نتایج به سال:
Mobile social networks (MSNs) are a special type of Delay tolerant networks (DTNs) in which mobile devices communicate opportunistically to each other. One of the most challenging issues in Mobile Social Networks (MSNs) is to design an efficient message forwarding scheme that has a high performance in terms of delivery ratio, latency and communication cost. There are two different approaches fo...
The main objective of this study was evaluation of integrated management and mixing saline/fresh water on soil salinity distribution. For this purpose, a field was selected and 32 plots were made in it with a 6 m×2.5 m size. A split plot experiment was employed with two sunflower varieties (Alstar and Hisan33), four irrigation schemes (CIS) and four replications. Irrigation schemes being ...
چکیده ندارد.
Concurrency on a massive scale is required to meet the needs of today’s increasingly distributed systems. To better understand how current concurrency control schemes work on distributed systems, this paper reports an evaluation of concurrency control schemes for online transaction processing (OLTP) workloads on distributed database management systems (DBMS) with a variable number of nodes. Fiv...
On-line evolution of robot controllers allows robots to adapt while they perform their proper tasks. In our investigations, robots contain their own self-sufficient evolutionary algorithm (known as the encapsulated approach) where individual solutions are evaluated by means of a time sharing scheme: an individual controller is given the run of the robot for some amount of time and fitness corre...
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rivest, Adleman and Dertouzos in 1978. In this work we define a theoretical object, chained encryption schemes, which allow an efficient evaluation of polynomials of degree d over encrypted data. Chained encryption scheme...
A On the Practicality of Cryptographic Defenses against Pollution Attacks in Wireless Network Coding
Numerous practical systems based on network coding have been proposed in recent years demonstrating the wide range of benefits of network coding such as increased throughput, reliability, and energy efficiency. However, network coding systems are inherently vulnerable to a severe attack, known as packet pollution, which presents a key obstacle to the deployment of such systems. Several cryptogr...
We discuss techniques for obtaining a numerically stable evaluation of the fully differential cross section for the virtual photon correction to single hard photon bremsstrahlung in two different computational schemes. We also compare the role of finite mass corrections in these schemes.
Digital watermarking is a process whereby random information is encoded into an image in such a way that the additional payload is indiscernible to the image observer. In this Paper, three typical watermarking techniques are compared and tested extensively, which not only include the private system, the semi-private system but also the public schemes. The comparisons mainly focus on the evaluat...
IT security certification and IT security evaluation criteria have changed their character compared with the first efforts ca. 20 years ago. They have also gained more interest within civilian and commercial application areas. Therefore this paper compares them with earlier criticism and with the new challenges in IT security. After an introduction into the concept of security certification the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید