نتایج جستجو برای: keywords notional security
تعداد نتایج: 2121554 فیلتر نتایج به سال:
-Clay/electrolyte systems are best characterized using a new variable, notional interfacial content (NIC). The NIC approach emphasizes that any division of the total amount of a species present in a clay/ electrolyte system into that part which 'belongs' to the clay and that part which 'belongs' to solution is necessarily arbitrary. It carries out this division by choosing one of the species as...
Franz Brentano is well known for highlighting the importance of intentionality, but he said curiously little about nature intentionality. According to Mark Textor, there a deep reason this: took intentionality be conceptual primitive which revealed only in direct grasp. Although certainly textual support this interpretation, it appears tension with Brentano's repeated attempts analyze terms ‘no...
In this paper, we propose a method to improve the security challenges in Nigeria by embedding literally hundreds of invisible computers into the environment with each computer performing its tasks without requiring human awareness or a large amount of human intervention to monitor human behaviour, natural disasters and search for stolen or lost items. Ubiquitous Dynamic Surveillance cameras emb...
Currently, HTTP Strict Transport Security, used to harden HTTPS, has gained increasing adoption in browsers and servers. We conduct an in-depth empirical security study of HSTS implementation in browsers, then successfully discover several new flaws in storage implementation and interaction with certificates. These flaws enable cookies theft, DoS, and bypassing problems. Moreover, we point out ...
Cloud computing is the delivery of computing services over the Internet. Protecting all users’ data in the cloud is highly challenging. Since all our data stored in third party’s computer, security concerns arise. The main focus in cloud storage is data security and integrity. This paper works on securing cloud data from corruptions, checking for its integrity and recovering data during failure...
In this paper, we show both theoretically and empirically that the size of over-the-counter (OTC) markets can be reduced without affecting individual net positions. First, we find that the networked nature of these markets generates an excess of notional obligations between the aggregate gross amount and the minimum amount required to satisfy each individual net position. Second, we show condit...
One of the key challenges in information retrieval is the problem of automated indexing. How can computers be used to automatically extract relevant index terms from documents? How should documents be represented to facilitate information access? Primarily, a good document representation should capture the topical and semantical relationships between documents. Thereby, it should support the co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید