نتایج جستجو برای: overlays
تعداد نتایج: 1797 فیلتر نتایج به سال:
We present a mechanism for providing differential data protection to publish/subscribe distributed systems, such as those used in peer-to-peer computing, grid environments, and others. This mechanism, termed “security overlays”, incorporates credential-based communication channel creation, subscription and extension. We describe a conceptual model of publish/subscribe services that is made conc...
In this paper, we explore the role of privacy-enhancing overlays in Bitcoin. To examine the effectiveness of different solutions, we first propose a formal definitional framework for virtual currencies and put forth a new notion of anonymity, taint resistance, that they can satisfy. We then approach the problem from a theoretical angle, by proposing various solutions to achieve provable taint r...
The major integral plasma membrane protein (IP39) of Euglena gracilis was radiolabeled, peptide mapped, and dissected with proteases to identify cytoplasmic domains that bind and anchor proteins of the cell surface. When plasma membranes were radioiodinated and extracted with octyl glucoside, 98% of the extracted label was found in IP39 or the 68- and 110-kD oligomers of IP39. The octyl glucosi...
Over the past several years, we have seen the emergence of numerous types of socalled "overlay" networks in the Internet. There are many diverse examples of such overlay networks including the content-delivery-caching networks, implemented by companies like Akamai, the peer-to-peer file sharing networks associated with applications such as BitTorrent, the voice-over-IP services offered via Skyp...
Online social networking has quickly become one of the most common activities of Internet users. As social networks evolve, they encourage users to share more information, requiring the users, in turn, to place more trust into social networks. Peer-to-peer (P2P) overlays provide an environment that can return ownership of information, trust, and control to the users, away from centralized third...
Large scale distributed applications spanning multiple domains should satisfy administrative autonomy property — allow users in a domain to control flow of information in to and out of their domains. Though DHTs offer a scalable solution for building distributed applications, they do not guarantee this property. We present a novel Autonomous DHT (ADHT) that guarantees path locality and path con...
In four studies children were asked to read aloud a passage of randomly ordered common words with and without a coloured sheet of plastic (overlay) placed upon the page. The children's rate of reading increased with the overlay, for some children more than for others. The children were also asked to undertake a test of texture segmentation in which targets consisting of a structured texture had...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید