نتایج جستجو برای: individual interests
تعداد نتایج: 485986 فیلتر نتایج به سال:
Conventional wisdom gives us the principle of Design for Security : to create secure software, design it to be secure from the ground up. To date, however, only a small fraction of software developed has followed this principle. Diverse security requirements and economic pressures often force software developers to abandon security and focus instead on functionality and performance. As a result...
My main research interests involve the study of neural information processing, neural coding and information representation in biological systems. In particular I am interested in understanding information processing functions of neural ensemble activity and the biological mechanisms through which these functions are implemented. My current research concentrates on three basic aspects related t...
EDUCATION Mar/00 Aug/04 Ph.D. in Electrical Engineering, Seoul National University (SNU), Seoul, Korea Thesis: Design of adaptive wireless OFDM transceivers (Advisor: Yong-Hwan Lee) Mar/98 Feb/00 M.S. in Electrical Engineering, SNU, Seoul, Korea Thesis: Adaptive channel estimation in pilot channel based DS-CDMA systems Mar/94 Feb/98 B.S. in Electrical Engineering (magna cum laude), SNU, Seoul, ...
2005–present HiStar: a secure operating system [2]. Led the HiStar project on designing and developing a new operating system that allows applications to minimize the amount of trusted code. HiStar allows applications to specify precise data security policies by specifying how different information can flow through the system. As a result, small amounts of trusted code can reason about the secu...
My primary and current research work is in the general spirit of algebras of logic, lattice theory, hyper structures and applications. A partially ordered set, or poset for short is a pair (P, ≤) where P is a set and ≤ a partial order on P. A poset (P, ≤) is called a lattice if every pair x, y ∈ P has a least upper bound x ∨ y and a greatest lowest bound x ∧ y in P. A lattice is bounded if it h...
The information age has witnessed a proliferation of personal data available in digital form that can be stored and analyzed. On the one hand, this has led to the development of data mining tools that aim to infer useful trends from this data. But, on the other hand, easy access to personal data poses a threat to individual privacy. My main research interest lies in the area of designing algori...
The Counseling System is the one of the basis on which all social and political affairs are presented and investigated through public and political consultation in the form of discussions and free conversations. In the Counseling system, it is the public wisdom and agreement that leads to the selection and determination of rulers, social and political constructs and institutions, codifying and ...
Drug crimes, regardless of the economic consequences, have threatened public and individual health and determined the international community to combat them effectively. Therefore, in the laws in question, confiscation of property is considered as a punishment for criminals of drug crimes; while from a jurisprudential point of view, this punishment has faced challenges. The findings of the pres...
Instagram has more than 400 million monthly active accounts who share more than 80 million pictures and videos daily. This large volume of user-generated content is the application’s notable strength, but also makes the problem of finding the authoritative users for a given topic challenging. Discovering topical authorities can be useful for providing relevant recommendations to the users. In a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید