نتایج جستجو برای: surfer
تعداد نتایج: 493 فیلتر نتایج به سال:
Intrusions are often viewed as catastrophic events which destroy systems, wreak havoc on data through corruption or substitution, yield access to closely guarded sensitive information, or provide a springboard for hackers to attack other systems. Yet not all intrusions on the Web are the blatant, smash-and-grab, trash-the-site kind of attacks. Many attacks are more subtle, and some involve what...
conclusions according to the factory noise map, except for the control rooms with 81 dba noise, other cases of measuring stations were higher than the standard exposure of 85 dba noise. as a result, the implementation of control strategies, such as inspection and performance of control systems and insulation of the control room to prevent unnecessary exposure noise, are necessary. background st...
This paper deals with the methodology of modelling the Dubňany lignite seam base and its tectonic failure. Tectonic pattern of the Vienna Basin has been subject of many studies. Opinions on its origin have been developing. Coal seams in the South Moravian Lignite Coalfield were modelled under the project of the example modern evaluation of the coal deposit. Designed software with application of...
The increasing number of uncharacterized protein structures necessitates the development of computational approaches for function annotation using the protein tertiary structures. Protein structure database search is the basis of any structure-based functional elucidation of proteins. 3D-SURFER is a web platform for real-time protein surface comparison of a given protein structure against the e...
Early approaches to mathematically abstracting websurfing behavior were largely based on first-order Markov models. Most humans however do not surf in a “memoryless” fashion, rather they are guided by their timedependent situational context and associated information needs. This belief is corroborated by the non-exponential revisit times observed in many site-centric weblogs. In this paper, we ...
Search engines use several criteria to rank webpages and choose which pages to display when answering a request. Those criteria can be separated into two notion, relevance and popularity. This notion of popularity is calculated by the search engine and is related to links made to the webpage. Malicious webmasters want to artificially increase their popularity, the techniques they use are often ...
User reaction to traffic congestion can have severe impact on network stability and significant implication for traffic engineering. For example, users who persist in large peer-to-peer transfers despite congestion can drive the network into congestion collapse. On the other hand, users who abort large transfers can smoothen self-similar traffic. We present a tool, called SAX, for studying cong...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید