نتایج جستجو برای: guarantee
تعداد نتایج: 39102 فیلتر نتایج به سال:
Recently, cloud technology has become popular for smart societies. The Cloud technology 13 has made dynamical network changes by enabling the construction of a logical network without 14 building a physical network. Despite recent research on the cloud, it is necessary to study security 15 functions for the identification of fake VNFs and the encryption of communication between entities. 16 In ...
Translation Memory (TM) is a key technology in the translation industry, its success based on several assumptions: that it saves time, provides cost savings, and enhances consistency. Our research tests the assumption of consistency in TMs. We examine English/German and English/Japanese TM data from two commercial companies with a view to measuring the levels of consistency (or inconsistency) b...
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer of trust in the other direction, from the signed data to the public key. Such a transfer is cryptographically robust only if the signature scheme has a property which we name exclusive ownership. In this article, we sh...
This paper deals with a constrained investment problem for a defined contribution (DC) pension fund where retirees are allowed to defer the purchase of the annuity at some future time after retirement. This problem has already been treated in the unconstrained case in a number of papers. The aim of this work is to deal with the more realistic case when constraints on the investment strategies a...
The performance of different ATM switch buffer queuing schemes for round-robin and weighted round-robin didn‘t have too much difference. This paper presents the discrete-event simulation provides detailed, accurate network simulation results and it observed a wide variety of network statistics. The software simulation package, OPNET, which specializes in discrete-event simulation of communicati...
This paper introduces a scalable maxmin flow control protocol which guarantees the minimum rate for each connection-oriented flow without requiring per-flow information. The protocol is called MR-ASAP (Minimum Rate guaranteeing Adaptive Source-link Accounting Protocol). MR-ASAP is an extension of ASAP [Tsa98a, Kim99], the first exact maxmin flow control protocol for best-effort connection-orien...
We present a new heuristic point-to-point routing algorithm based on contraction hierarchies (CH). Given an ε ≥ 0, we can prove that the length of the path computed by our algorithm is at most (1 + ε) times the length of the optimal (shortest) path. CH is based on node contraction: removing nodes from a network and adding shortcut edges to preserve shortest path distances. Our algorithm tries t...
Process algebras are a set of mathematically rigourous languages with well defined semantics that permit modelling behaviour of concurrent and communicating systems. Verification of concurrent systems within the process algebraic approach can be performed by checking that processes enjoy properties described by some temporal logic’s formulae. In this paper we present a formal framework that per...
Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition. Yet, no method proposed to date explicitly bounds the percentage of information an adversary gains after seeing the published data for each sensitive...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید