نتایج جستجو برای: idm
تعداد نتایج: 613 فیلتر نتایج به سال:
The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme ...
It is presently unclear whether the antiseizure effects exerted by NSAIDs are totally dependent on COX inhibition or not. To clarify this point we investigated whether 7-methyl-2-phenylimidazo[1,2-b]pyridazine-3-carboxylic acid (DM1) and 6-methoxy-2-phenylimidazo[1,2-b]pyridazine-3-carboxylic acid (DM2), two imidazo[1,2-b]pyridazines structurally related to indomethacin (IDM) but ineffective in...
BACKGROUND Worldwide, nearly 3 million people die of chronic obstructive pulmonary disease (COPD) every year. Integrated disease management (IDM) improves disease-specific quality of life and exercise capacity for people with COPD, but can also reduce hospital admissions and hospital days. Self-management of COPD through eHealth interventions has shown to be an effective method to improve the q...
The use of Identity Management (IdM) may leverage the trust in a distributed Publish-Subscribe (PubSub) system. An IdM provides mutual authentication between publishers, subscribers and message routers, enforces access control on message delivery and integrity control of message content. Access control is also a means to reduce traffic in a PubSub network since unauthorized message traffic will...
Enterprise Identity Management (IDM) systems promise users to be equipped with a single enterprise identity and administrators with better users management environment. That increases security, provides the organizations with value-added data and money saving in user management. In fact, in order to do collaboration among independent organizations, each participant must first have a working IDM...
A new model for learning from multinomial data has recently been developed, giving predictive inferences in the form of lower and upper probabilities for a future observation. Apart from the past observations, no information on the sample space is assumed, so explicitly no assumptions are made on the number of possible categories. In this paper, we briefly present the general lower and upper pr...
Promoting interactions among participants in an onlinecommunity is catching attention of web sites’ managers. In this paper, we first introduce Influence Diffusion Model (IDM), a method for discovering influential comments, participants and terms from threaded online discussions, and evaluate the performance by precision and recall measurement. Then we propose a new method for profiling of part...
In the software systems field, we can consider that the generally understood goal of verification is to assess the compliance of a software with respect to the inputs and standards applying to a given phase in the design process, and that the goal of validation is to determine if the requirements are correct and complete, and is performed in the final system assessment phase. Nevertheless, the ...
Techniques using interleaving as the basic means for signal separation are introduced for both multiple access systems and multiple transmit antenna systems. For multiple access channels, the proposed interleave-division multiple-access (IDMA) scheme can achieve near capacity performance. For multiple antenna systems, the performance of the proposed interleave-division-multiplexing space-time (...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید