نتایج جستجو برای: keywords notional security

تعداد نتایج: 2121554  

2005
Pavel Okunev

We propose a fast algorithm for computing the expected tranche loss in the Gaussian factor model. We test it on a 125 name portfolio with a single factor Gaussian model and show that the algorithm gives accurate results. We choose a 125 name portfolio for our tests because this is the size of the standard DJCDX.NA.HY portfolio. The algorithm proposed here is intended as an alternative to the mu...

2002
Graeme Forbes

Depiction Verbs and the Definiteness E ff ect  Introduction This paper is part of a longer project on the semantics of depiction verbs and their associated relational nouns. Depiction verbs include verbs for physical acts, such as ' draw' (with relational noun ' drawing'), 'sketch', 'caricature', 'sculpt', 'write (about)', and verbs for mental ones, such as 'visualize', 'imagine', and 'fantasi...

Journal: :Proceedings of the AAAI Conference on Artificial Intelligence 2020

Journal: :Journal of Memory and Language 2014

Journal: :Computer and Information Science 2013

2016

Internet of Things (IoT) is a network of physical objects connected to internet. Physical objects embedded with RFID, sensor and so on which allows object to communicate with each other. The physical objects are provided with unique identifier. Since the IoT is highly heterogeneous, security is a big challenge in IoT. In this paper we analyzed the various security requirements and challenges in...

2003
Javier Lopez Juan J. Ortega José M. Troya José Luis Vivas

In order to study security systems, we have developed a methodology for application of formal analysis techniques commonly used in communication protocols to the analysis of cryptographic protocols. In particular, we have extended the design and analysis phases of protocol design with security properties. Our proposal uses a specification notation based on HMSC/MSC, which can be automatically t...

2014
Jamuna Bhandari Cliff Stoll

String matching also known as pattern matching is one of primary concept for network security. In this area the effectiveness and efficiency of string matching algorithms is important for applications in network security such as network intrusion detection, virus detection, signature matching and web content filtering system. This paper presents brief review on some of string matching technique...

2013
Madhusmita Sahoo Sabita Pal Rina Mahakud

Today the demand for secure transfers of digital images , cryptanalysis and network security is a growing field. In this paper the security of RCES is analyzed and observed that it is insecure against the known/chosen-plaintext attacks .Here two seeds are generated chaotically and XOR’ed with plain image to get cipher image . The security of RCES against the bruteforce attack was overestimated....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید