نتایج جستجو برای: enhancing values

تعداد نتایج: 601335  

2003
Nicklas Lundblad

In this paper, an economic study of different levels of expected privacy, both individual and collective, is used to demonstrate that we live neither in a dystopian control society nor in a utopian privacy enhanced society, but rather in a noise society characterized by high collective expectations of privacy and low individual expectations of privacy. This has profound consequences for the des...

Journal: :AJNR. American journal of neuroradiology 2001
J A Koziol S Wagner D F Sobel L S Slivka J S Romine J C Sipe H P Adams

BACKGROUND AND PURPOSE Recent studies have suggested that enhancing lesions on contrast-enhanced T1-weighted MR images are predictive of impending exacerbations in cases of relapsing-remitting multiple sclerosis. We examined whether enhancing lesions, new enhancing lesions, and new hypointense lesions ("black holes") could accurately predict exacerbations in a cohort of 50 patients with relapsi...

2009
Haitham S. Cruickshank Robert J. Mort Matteo Berioli

Satellites had been successful in the past due to their wide area coverage and speedy deployment of new services especially in remote regions of Europe and the rest of the world. The future development of broadband satellite systems providing services based on the Internet Protocol (IP) needs to be stimulated by means of common standards. This paper presents the ETSI BSM PEP terminal architectu...

2006
Giannakis Antoniou Campbell Wilson Dimitris Geneiatakis

Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhancing Technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered. This paper proposes a forensic investigation technique, which can be...

2010
Patrizio Campisi Emanuele Maiorana Alessandro Neri

In the recent past we have witnessed the rapid spreading of biometric technologies for automatic people authentication, due to the several inherent advantages they offer over classic methods. Biometrics can be defined as the analysis of physiological or behavioral people characteristics for automatic recognition purposes. Biometric authentication relies on who a person is or what a person does,...

2003
Pascal Berthou Thierry Gayraud Olivier Alphand C. Prudhommeaux Michel Diaz

Wireless networks have become increasingly popular for the past few years, especially IEEE 802.11 as the most widespread wireless technology. This article proposes a new architecture for broadband 802.11 networks to support distributed multimedia applications. After discussing the differences between multimedia and traditional applications, we show how the 802.11b mechanism ensuring enhanced ro...

2005
Hannes Federrath

Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technologies. The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it p...

2006
Gilda Pour

Security and privacy issues have become far more critical and complex in the Internet era. Balancing security enhancement and privacy protection remains a key challenge involving both technical and non-technical issues. It is crucial to restructure computer and software engineering curricula to familiarize students with the challenges and opportunities associated with the security and privacy i...

Journal: :IEEE Trans. Parallel Distrib. Syst. 1996
Dina Kravets C. Greg Plaxton

Given a sequence of n elements, the All Nearest Smaller Values (ANSV) problem is to nd, for each element in the sequence, the nearest element to the left (right) that is smaller, or to report that no such element exists. Time and work optimal algorithms for this problem are known on all the PRAM models 3], 5], but the running time of the best previous hypercube algorithm 6] is optimal only when...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید