نتایج جستجو برای: proactive procedures

تعداد نتایج: 267924  

Journal: :IACR Cryptology ePrint Archive 1996
Yair Frankel Peter Gemmell Philip D. MacKenzie Moti Yung

The notion of \proactive security" of basic primitives and cryptosystems has been introduced by Ostrovsky and Yung to deal with a very strong \mobile adversary" who may corrupt all participants (servers, each with private memory) throughout the lifetime of the system in a non-monotonic fashion (i.e. recoveries are possible), but who is not able to corrupt too many participants during any short ...

2010
Kyle Ristig

This research empirically examines the relationship between trust and voice, proactive personality and voice, and whether proactive personality moderates the relationship between trust and voice. A total of 105 employees were surveyed using a 14 item instrument to assess the subjects’ responses to the factors under investigation, as well as demographic characteristics. Based on regression analy...

2012
Vaibhav Kumar R. P. Ojha

This research paper introduces a scheme to secure any secret value in cloud network by Mobile Proactive Secret Sharing (MPSS). This is an extension of proactive secret sharing, where contributing parties of a network hold the shares of a secret value. Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: instead of the group of shareho...

Journal: :Int. J. Cooperative Inf. Syst. 2007
Kaivan Kamali Xiaocong Fan John Yen

Helping behavior in effective teams is achieved via some overlapping “shared mental models” that are developed and maintained by members of the team. In this paper, we take the perspective that multiparty “proactive” communication is critical for establishing and maintaining such a shared mental model among teammates, which is the basis for agents to offer proactive help and to achieve coherent...

2015
Nawneet Raj Priyanka Bharti Sanjeev Thakur

Mobile ad-hoc network (MANET) is the collection of various mobile nodes which are connected together over a wireless medium having no fixed infrastructure. In recent years, a broad research has been done in the domain of Mobile Ad-hoc Networks (MANETs). Ad hoc routing protocols for MANETs are classified into: proactive, reactive and hybrid approaches. Hybrid routing approach is introduced to ov...

2012
Po-Han Lin Steven J. Luck

The change detection task has become a standard method for estimating the storage capacity of visual working memory. Most researchers assume that this task isolates the properties of an active short-term storage system that can be dissociated from long-term memory systems. However, long-term memory storage may influence performance on this task. In particular, memory traces from previous trials...

2015
Peter Smittenaar Robb B. Rutledge Peter Zeidman Rick A. Adams Harriet Brown Glyn Lewis Raymond J. Dolan Xi Luo

One expression of executive control involves proactive preparation for future events, and this contrasts with stimulus driven reactive control exerted in response to events. Here we describe findings from a response inhibition task, delivered using a smartphone-based platform, that allowed us to index proactive and reactive inhibitory self-control in a large community sample (n = 12,496). Chang...

2002
Hoa-Binh Nguyen Andrzej Duda

We propose an active node architecture that supports proactive services able to take into account adaptability to varying conditions and exible supervision by the application or the user. Proactive services are software modules that can be deployed in the network at chosen nodes. Each service processes ows of packets forwarded by a node. A packet lter recognizes some packets according to the in...

2015

This study is to fill up a research gap on examining the differences in normative beliefs (namely acceptance of weaknesses, acceptance of provoked aggression, and acceptance of unprovoked aggression) among different subtypes of aggressors and non-aggressors (reactive aggressors, proactive aggressors, reactive-proactive aggressors, and non-aggressors). 2,236 students (1,372 males and 864 females...

2008
Denis Caromel

ProActive [2] is a Java library (Source code under GPL license) for parallel, distributed, and concurrent computing, also featuring mobility and security in a uniform framework. ProActive aimed at simplifying the programming of applications that are distributed on Local Area Network (LAN), on cluster of workstations, or large scale Grids. ProActive promotes a strong NoC approach, Network On Shi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید