نتایج جستجو برای: secure sets
تعداد نتایج: 266654 فیلتر نتایج به سال:
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing environments that are immune to both physical and software attacks. Despite a number of secure processor designs have been proposed, they typically made trade-offs between security and efficiency. This article proposes ...
Life cycle assessment (LCA) is the standard technique used to make a quantitative evaluation about the ecological sustainability of a product or service. The life cycle inventory (LCI) data sets that provide input to LCA computations can express essential information about the operation of a process or production step. As a consequence, LCI data are often regarded as confidential and are typica...
A subjective evaluation of services and agents play a fundamental role in open systems. The vague nature of the personal criteria used in subjective evaluations justify the use of fuzzy sets. This distributed approach requires cooperation (information sharing) between agents with similar criteria to improve decision making process. So similarity between criteria is used to decide whether cooper...
Byzantine broadcast is a distributed primitive that allows a specific party to consistently distribute a message among n parties in the presence of potential misbehavior of up to t of the parties. The celebrated result of [PSL80] shows that broadcast is achievable from point-to-point channels if and only if t < n/3. The following two generalizations have been proposed to the original broadcast ...
This paper addresses the problem of creating patterns to model the normal behavior of UNIX processes. The pattern model can be used for intrusion-detection purposes. First, we present methods to generate input data sets that enable us to observe the normal behavior of a process in a secure environment. Second, we propose various techniques to derive either fixed-length or variable-length patter...
Let be a simple graph with vertex set and edges set . A set is a dominating set if every vertex in is adjacent to at least one vertex in . An eternal 1-secure set of a graph G is defined as a dominating set such that for any positive integer k and any sequence of vertices, there exists a sequence of guards with and either or and is a dominating set. If we take a guard on every ver...
Purpose: This study was done to predict sexual communication based on attachment style and differentiation of self in married female students of Universities in city of Ahvaz. The 220 participants were selected through accessible sampling. Methods: The participants completed Wheeless & Baus Sexual Communication Scale (1984), Simpson Adult Attachment Scale Questionnaire (2003), and Differentiati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید