نتایج جستجو برای: administrator
تعداد نتایج: 4932 فیلتر نتایج به سال:
Intrusion Detection System (IDS) is used to detect intrusion and then alert the system administrator about the intrusion. This is what traditional IDS is all about. It is then up to the system administrator to deal with the intrusion. Human intervention is still needed when it comes to dealing with intrusion. This is because traditional IDS could only detect the intrusion but could not, on its ...
We know how important our profession is. Yet we are often frustrated in trying to communicate its significance to our bosses, our board chairs, our funders, the not-for-profit and government community and, even, our families and friends. How we cringe when someone says, "we ought to start a volunteer program" and turns to someone on staff and says, "in your spare time, won't you look after the ...
Network-layer authentication security services are typically pessimistic and static. A conservative IP security gateway checks/veriies the authentication information for every packet it forwards. This implies that, even there is no bad guy in the network, the authentication check is still performed for every packet. In this paper, we examine a sleepy approach, where the gateways normally do not...
The high iron content in the soils and resident parent material of the Georgia Piedmont results in significant transport of iron in runoff to receiving waterbodies. Phosphorus cycling in lakes can be significantly affected by the iron cycle. The work presented here describes experiments to test sorption and desorption of phosphate from Bt horizon soil to help illuminate the role of transported ...
REPRESENTATION SPECIFIC REPRESENTATION INDEPENDENT Conditions are expressed in terms of abstract properties of the object and do not refer to the particular implementation ACT++, ROSETTE, PROCOL, PATH EXPRESSIONS Condition are expressed directly on the hidden object state. GUIDE, Hybrid, SINA ACCEPTANCE CONDITIONAL ACCEPTANCE M. Papathomas and O. Nierstrasz 8 the client are not acceptable from ...
The article conducted a study and analysis of the problems that arise in course activities beauty salon administrator. administrator plays an important role effective work organization improving quality customer service. He is engaged drawing up schedule, controls cost services craftsmen, responsible for availability consumables stock, provides high level service from consulting booking appoint...
This paper presents a novel secret voting scheme which fully conforms to the requirements of large scale elections. The participants in the scheme are voters, candidates, an administrator, and a counter. The scheme uses threshold encryption to preserve the privacy and accuracy of the votes against dishonesty of voters, candidates, the administrator , and the counter. It also ensures veriiabilit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید