نتایج جستجو برای: individual interests

تعداد نتایج: 485986  

2007
Vinod Ganapathy

Conventional wisdom gives us the principle of Design for Security : to create secure software, design it to be secure from the ground up. To date, however, only a small fraction of software developed has followed this principle. Diverse security requirements and economic pressures often force software developers to abandon security and focus instead on functionality and performance. As a result...

2008
Alexander G Dimitrov

My main research interests involve the study of neural information processing, neural coding and information representation in biological systems. In particular I am interested in understanding information processing functions of neural ensemble activity and the biological mechanisms through which these functions are implemented. My current research concentrates on three basic aspects related t...

2012
Ji-Woong Choi Yong-Hwan Lee

EDUCATION Mar/00 Aug/04 Ph.D. in Electrical Engineering, Seoul National University (SNU), Seoul, Korea Thesis: Design of adaptive wireless OFDM transceivers (Advisor: Yong-Hwan Lee) Mar/98 Feb/00 M.S. in Electrical Engineering, SNU, Seoul, Korea Thesis: Adaptive channel estimation in pilot channel based DS-CDMA systems Mar/94 Feb/98 B.S. in Electrical Engineering (magna cum laude), SNU, Seoul, ...

2008
NICKOLAI ZELDOVICH

2005–present HiStar: a secure operating system [2]. Led the HiStar project on designing and developing a new operating system that allows applications to minimize the amount of trusted code. HiStar allows applications to specify precise data security policies by specifying how different information can flow through the system. As a result, small amounts of trusted code can reason about the secu...

2014
Jean B. Nganou

My primary and current research work is in the general spirit of algebras of logic, lattice theory, hyper structures and applications. A partially ordered set, or poset for short is a pair (P, ≤) where P is a set and ≤ a partial order on P. A poset (P, ≤) is called a lattice if every pair x, y ∈ P has a least upper bound x ∨ y and a greatest lowest bound x ∧ y in P. A lattice is bounded if it h...

2006
Krishnaram Kenthapadi

The information age has witnessed a proliferation of personal data available in digital form that can be stored and analyzed. On the one hand, this has led to the development of data mining tools that aim to infer useful trends from this data. But, on the other hand, easy access to personal data poses a threat to individual privacy. My main research interest lies in the area of designing algori...

The Counseling System is the one of the basis on which all social and political affairs are presented and investigated through public and political consultation in the form of discussions and free conversations. In the Counseling system, it is the public wisdom and agreement that leads to the selection and determination of rulers, social and political constructs and institutions, codifying and ...

Azizollahi, Hojjat, Nazari Tavakkoli, Saeid,

Drug crimes, regardless of the economic consequences, have threatened public and individual health and determined the international community to combat them effectively. Therefore, in the laws in question, confiscation of property is considered as a punishment for criminals of drug crimes; while from a jurisprudential point of view, this punishment has faced challenges. The findings of the pres...

2016
Aditya Pal Amac Herdagdelen Sourav Chatterji Sumit Taank Deepayan Chakrabarti

Instagram has more than 400 million monthly active accounts who share more than 80 million pictures and videos daily. This large volume of user-generated content is the application’s notable strength, but also makes the problem of finding the authoritative users for a given topic challenging. Discovering topical authorities can be useful for providing relevant recommendations to the users. In a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید