نتایج جستجو برای: considers the reliable authoritie

تعداد نتایج: 16059892  

2010
A. Francillon

This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...

2009
Micah Sherr

Chairman Snyder, Chairwoman Brown, Members of the Subcommittee, it is an honor to join you here today. The election process is the cornerstone of our democracy. Ensuring reliable elections and increasing the public's confidence and trust in the election process are perhaps the two most important responsibilities of our federal, state, and local governments. As this committee considers how voter...

2008
Gisela Pujol José Rodellar Josep M. Rossell

This work presents the design of a reliable decentralized state feedback control for a class of uncertain interconnected polytopic continous systems. A model of failures in actuators is adopted which considers outages or partial degradation in independent actuators. The control is developed using the concept of guaranteed cost control and a new LMI characterization using polytopic Lyapunov func...

2017
Kristin Firth David A. Hoffman Tess Wilkinson-Ryan

Over the last thirty years, legal scholars have increasingly deployed experimental studies, particularly hypothetical scenarios, to test intuitions about legal reasoning and behavior. That movement has accelerated in the last decade, facilitated in large part by cheap and convenient Internet participant recruiting platforms like Amazon Mechanical Turk. The widespread use of MTurk subjects, a pr...

It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, ...

2011
Jessica M. Solis Andrea Hussong

The current study examined conflict resolution strategies parents and adolescents use when discussing a disagreement and how these strategies relate to adolescent depression. A global, observational coding system was used to investigate the specific engaging (i.e., active listening, autonomy promoting and expressing, and relational) and disengaging (i.e., hostile, controlling, and withdrawal) s...

As a general branch of project scheduling problems, resource investment problem (RIP) considers resource availabilities as decision variables to determine a level of employed resources minimizing the costs of the project. In addition to costs (cash outflows), researchers in the later extensions of the RIP took payments (cash inflows) received from clients into account and used the net present v...

Journal: :Journal of the American Academy of Child and Adolescent Psychiatry 2006
Steven W Evans Eric Youngstrom

This column focuses on the valid, reliable, and useful measurement of treatment effects in children and adolescents with attention-deficit/hyperactivity disorder (ADHD) treated in practice settings. Recall that the composite case of Polly refers to an 11 year-old female who was evaluated and determined to have probably met diagnostic criteria for ADHD, combined type (Frazier and Youngstrom, 200...

2005
Richard A. Wasniowski

A wide spectrum of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual person. This paper considers multimodal biometric system and their applicability to access control, authentication and security applications. Strategies for feature extraction and sensor fusion are considered and contrasted. Issues related to performance assessme...

2005
RICHARD A. WASNIOWSKI

A wide spectrum of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual person. This paper considers multimodal biometric systems and their applicability to access control, authentication and security applications. Alternative strategies for feature extraction and sensor fusion are considered and contrasted. Issues related to perfor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید