نتایج جستجو برای: access pattern

تعداد نتایج: 666151  

2002
Mahmut T. Kandemir Alok N. Choudhary

Despite continued innovations in design of I/O systems, I/O performance has not kept pace with the progress in processor and communication technology. This paper addresses this I/O problem from a compiler’s perspective, and presents an I/O optimization strategy based on access pattern and storage form (file layout) detection. The objective of our optimization strategy is to determine storage fo...

Journal: :IACR Cryptology ePrint Archive 2017
Cédric Van Rompay Refik Molva Melek Önen

Searchable Encryption (SE) allows a user to upload data to the cloud and to search it in a remote fashion while preserving the privacy of both the data and the queries. Recent research results describe attacks on SE schemes using the access pattern, denoting the ids of documents matching search queries, which most SE schemes reveal during query processing. However SE schemes usually leak more t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2010
Muhammad Adnan Tariq Gerald G. Koch Boris Koldehofe Imran Khan Kurt Rothermel

Current distributed publish/subscribe systems assume that all participants have similar QoS requirements and equally contribute to the system’s resources. However, inmany real-world applications, themessage delay tolerance of individual peers may differ widely. Disseminating messages according to individual delay requirements not only allows for the satisfaction of user-specific needs but also ...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2008
Bruno Gonçalves José J. Ramasco

The increasing ubiquity of Internet access and the frequency with which people interact with it raise the possibility of using the Web to better observe, understand, and monitor several aspects of human social behavior. Web sites with large numbers of frequently returning users are ideal for this task. If these sites belong to companies or universities, their usage patterns can furnish informat...

2013
Anders Fongen Federico Mancini

The use of Identity Management (IdM) may leverage the trust in a distributed Publish-Subscribe (PubSub) system. An IdM provides mutual authentication between publishers, subscribers and message routers, enforces access control on message delivery and integrity control of message content. Access control is also a means to reduce traffic in a PubSub network since unauthorized message traffic will...

Journal: :CoRR 2011
Wolfgang Konen

The goal of machine learning is to provide solutions which are trained by data or by experience coming from the environment. Many training algorithms exist and some brilliant successes were achieved. But even in structured environments for machine learning (e.g. data mining or board games), most applications beyond the level of toy problems need careful hand-tuning or human ingenuity (i.e. dete...

Journal: :EURASIP J. Wireless Comm. and Networking 2012
Naima Iltaf Abdul Ghafoor Mukhtar Hussain

To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity re...

2004
Michael Lifshits Roman Goldenberg Ehud Rivlin Michael Rudzsky

In this paper we present a new method for self-localization on wafers using geometric hashing. The proposed technique is robust to image changes induced by process variations, as opposed to the traditional, correlation based methods. Moreover, it eliminates the need in training on reference patterns. Two enhancements are introduced to the basic geometric hashing scheme improving its performance...

2007
I. Drobnjak G. Pell M. Jenkinson

Introduction: Direct neuronal current imaging is a method that could potentially provide direct access to neuronal activity with an excellent spatial (mm) and temporal resolution (ms) [1-3]. However, so far it has not been convincingly demonstrated that MRI has adequate sensitivity to detect neuronal currents in vivo. In order to pin down the most influential factors in the signal formation, wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید