نتایج جستجو برای: subsea structures integrity
تعداد نتایج: 521574 فیلتر نتایج به سال:
Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cl...
many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. in this paper we discuss integrity and its properties in vulnerability calculation. the integrity of a graph g, i(g), is defined t...
Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data owners to contribute data sets to an untrusted third-party publisher, who then answers users’ queries. Each owner gets a proof from the publisher that his data is properly represented, and each user gets a proof that the answ...
We consider a sensor network that is not fully trusted and ask the question how we preserve privacy for the collected data and how we verify the data reply from the network. We explore the problem in the context of a network augmented with storage nodes and target at range query, a very general and powerful type of query. We use bucketization to mix the data for a range, use message encryption ...
At the same time, many product development organizations today are burdened with a wide array of disparate application lifecycle management (ALM) tools acquired over time and incrementally bundled together to automate the myriad of high-ceremony development processes. The resulting environment is one fraught with redundancy, inefficiency, error, escalating costs, compliance issues and lack of v...
Tensegrity structures are nice-looking and statically strong architectural complexes composed of a set of disjoint struts tied together by cables and nothing more. These structures are known for their aesthetic and structural qualities, which are explored in architecture and art. Their perceived lightness is their distinct visual feature: the heavy elements (the struts) are well disjoint, yet t...
Until recently, research focus has been on a variety of demographic, attitudinal, and organizational variables in predicting and explaining absenteeism. If personality traits predict absenteeism, then it may be possible to use measures of these traits to identify and select job applicants and thereby reduce absenteeism rates. In this research, our goal was to examine whether integrity tests cou...
The ability of intruders to hide their presence in compromised systems has surpassed the ability of the current generation of integrity monitors to detect them. Once in control of a system, intruders modify the state of constantly-changing dynamic kernel data structures to hide their processes and elevate their privileges. Current monitoring tools are limited to detecting changes in nominally s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید