نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

Journal: :J. Parallel Distrib. Comput. 2006
Chenghuai Lu Tao Zhang Weidong Shi Hsien-Hsin S. Lee

Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing environments that are immune to both physical and software attacks. Despite a number of secure processor designs have been proposed, they typically made trade-offs between security and efficiency. This article proposes ...

2016
Brandon Kuczenski Cetin Sahin Amr El Abbadi

Life cycle assessment (LCA) is the standard technique used to make a quantitative evaluation about the ecological sustainability of a product or service. The life cycle inventory (LCI) data sets that provide input to LCA computations can express essential information about the operation of a process or production step. As a consequence, LCI data are often regarded as confidential and are typica...

2003
Javier Ignacio Carbó Rubiera José M. Molina López Jorge Dávila Muro

A subjective evaluation of services and agents play a fundamental role in open systems. The vague nature of the personal criteria used in subjective evaluations justify the use of fuzzy sets. This distributed approach requires cooperation (information sharing) between agents with similar criteria to improve decision making process. So similarity between criteria is used to decide whether cooper...

Journal: :IACR Cryptology ePrint Archive 2015
Pavel Raykov

Byzantine broadcast is a distributed primitive that allows a specific party to consistently distribute a message among n parties in the presence of potential misbehavior of up to t of the parties. The celebrated result of [PSL80] shows that broadcast is achievable from point-to-point channels if and only if t < n/3. The following two generalizations have been proposed to the original broadcast ...

Journal: :Journal of Computer Security 1998
Hervé Debar Marc Dacier Mehdi Nassehi Andreas Wespi

This paper addresses the problem of creating patterns to model the normal behavior of UNIX processes. The pattern model can be used for intrusion-detection purposes. First, we present methods to generate input data sets that enable us to observe the normal behavior of a process in a secure environment. Second, we propose various techniques to derive either fixed-length or variable-length patter...

ژورنال: پژوهش های ریاضی 2022

Let  be a simple graph with vertex set  and edges set . A set  is a dominating set if every vertex in  is adjacent to at least one vertex  in . An eternal 1-secure set of a graph G is defined as a dominating set  such that for any positive integer k and any sequence  of vertices, there exists a sequence of guards   with  and either  or  and  is a dominating set. If we take a guard on every ver...

Journal: :bulletin of the iranian mathematical society 2011
m. caldas s. jafari r. k. saraf

Journal: :International Journal of Computer Applications 2015

ژورنال: پژوهش های مشاوره 2018

Purpose: This study was done to predict sexual communication based on attachment style and differentiation of self in married female students of Universities in city of Ahvaz. The 220 participants were selected through accessible sampling. Methods: The participants completed Wheeless & Baus Sexual Communication Scale (1984), Simpson Adult Attachment Scale Questionnaire (2003), and Differentiati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید