نتایج جستجو برای: security environment

تعداد نتایج: 678646  

Journal: :International Journal on Recent and Innovation Trends in Computing and Communication 2023

Fog computing is an innovative way to expand the cloud platform by providing resources. The a that has same data, management, storage and application features, but their origins are different because they deployed locations. system can retrieve large amount, work in field, be fully loaded, mount on variety of hardware devices. With this utility, Framework perfect for applications critical momen...

2011
John Miller

Distributed virtual environments (DVEs) have been an active area of research and engineering for more than 20 years. The most widely deployed DVEs are network games such as Quake, Halo, and World of Warcraft (WoW), with millions of users and billions of dollars in annual revenue. Deployed DVEs remain expensive centralized implementations despite significant research outlining ways to distribute...

Journal: :CoRR 2016
Seyed Hossein Ahmadpanah

In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which...

2013
Derek Byerlee

Rapid population growth, urbanization and rising incomes will present an unprecedented opportunity for growth of commercial agriculture and agribusiness in coming years. The value of food consumed in urban areas is set to expand by four times to 2030, but given evidence of a continuing decline in competitiveness much of this could be sourced from imports even in countries with an apparent compa...

Journal: :Environment and urbanization 1998
B Hartmann

This paper critically examines the literature on the interaction between population, the environment, and development. It posits that population pressure and resource scarcities are unfairly blamed for internal conflicts in Africa, Asia, and Latin America. Internal conflicts are, in fact, affected by underlying economic and political causes (international companies, development assistance age...

Journal: :Journal of Computer Security 2002
Alec Yasinsac

Secure electronic communication relies on cryptography. Even with perfect encryption, communication may be compromised without effective security protocols for key exchange, authentication, etc. We are now seeing proliferation of large secure environments characterized by high volume, encrypted traffic between principals, facilitated by Public Key Infrastructures (PKI). PKIs are dependent on se...

2013
Alka P. Sawlikar Z. J. Khan S. G. Akojwar

Speech scrambling techniques are used to scramble clear speech into unintelligible signal in order to avoid eavesdropping. . Analog scramblers are intended in applications where the degree of security is not too critical and hardware modifications are prohibitive due to its high cost .The residual intelligibility of the speech signal can be reduced by reducing correlation among the speech sampl...

2006
Elmarie Kritzinger

In the last few years the education environment underwent a paradigm shift due to the rapid growth in technology. This growth made it possible for the education environment to utilize electronic services to enhance their education methods. It is, however, vital that all education environments (traditional or new ones) ensure that all resources (lectures, students and information) are properly p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید