نتایج جستجو برای: bogus metric
تعداد نتایج: 82175 فیلتر نتایج به سال:
banach contraction principle has been generalized in different spaces by mathematicians over the years. mustafa and sims [18] proposed a new class of generalized metric spaces, which are called as g-metric spaces. in this type of spaces a non-negative real number is assigned to every triplet of elements. many mathematicians studied extensively various results on g-metric spaces by using the con...
To protect the so-called self-employed, a multilevel solution is needed. Requalification first step and to do this, broad definition of employment agreement presumption an in some situations, useful. But even then, clear distinction between bogus self-employed real entrepreneurs sometimes difficult make requalification for who work individuals problematic. Working on base service contract gives...
If subjects can be convinced that a physiological monitoring device is able to measure both the amplitude and direction of emotional response, their subsequent attempts to predict what the machine says about their attitudes should be uncontaminated by many of the biases that obscure paper-and-pencil measures. This assumes that subjects do not want to be second-guessed by a machine. Four experim...
The claim is not just that one finds questionable examples in linguistics papers, but that lax data-collection standards have led to the growth of theories that are based upon bogus data. If these charges stick, then we face a genuine crisis. In order for there to be a crisis, however, it would need to be the case that (i) Intuitive judgments have led to generalizations that are widely accepted...
In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports into the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powe...
Article history: Received 9 April 2015 Revised 26 February 2016 Accepted 11 March 2016 Available online 17 March 2016 According to self-completion theory (SCT; Wicklund & Gollwitzer, 1982), people committed to identity goals (e.g., being a lawyer or a business manager) strive for goal attainment by collecting indicators of completeness (e.g., relevant achievements).When the completeness of an i...
Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets. A well-known countermeasure against resource depletion at...
Current synoptic sky surveys monitor large areas of the sky to find variable and transient astronomical sources. As the number of detections per night at a single telescope easily exceeds several thousand, current detection pipelines make intensive use of machine learning algorithms to classify the detected objects and to filter out the most interesting candidates. A number of upcoming surveys ...
Obtaining user feedback (using votes) is essential in ranking user-generated online content. However, any online voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating several Sybil identities. In this paper, we present SumUp, a Sybilresilient online content rating system that leverages trust networks among users to defend against Sybil attacks wi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید