نتایج جستجو برای: guarantee

تعداد نتایج: 39102  

2018
Sangho Park Hyunjin Kim Jaehyung Park Jaecheol Ryou

Recently, cloud technology has become popular for smart societies. The Cloud technology 13 has made dynamical network changes by enabling the construction of a logical network without 14 building a physical network. Despite recent research on the cloud, it is necessary to study security 15 functions for the identification of fake VNFs and the encryption of communication between entities. 16 In ...

2011
Joss Moorkens

Translation Memory (TM) is a key technology in the translation industry, its success based on several assumptions: that it saves time, provides cost savings, and enhances consistency. Our research tests the assumption of consistency in TMs. We examine English/German and English/Japanese TM data from two commercial companies with a view to measuring the levels of consistency (or inconsistency) b...

2005
Thomas Pornin Julien P. Stern

Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer of trust in the other direction, from the signed data to the public key. Such a transfer is cryptographically robust only if the signature scheme has a property which we name exclusive ownership. In this article, we sh...

Journal: :European Journal of Operational Research 2014
Marina Di Giacinto Salvatore Federico Fausto Gozzi Elena Vigna

This paper deals with a constrained investment problem for a defined contribution (DC) pension fund where retirees are allowed to defer the purchase of the annuity at some future time after retirement. This problem has already been treated in the unconstrained case in a number of papers. The aim of this work is to deal with the more realistic case when constraints on the investment strategies a...

2010
Parag Jain Sandip Vijay S. C. Gupta

The performance of different ATM switch buffer queuing schemes for round-robin and weighted round-robin didn‘t have too much difference. This paper presents the discrete-event simulation provides detailed, accurate network simulation results and it observed a wide variety of network statistics. The software simulation package, OPNET, which specializes in discrete-event simulation of communicati...

1999
Yuseok Kim Wei Kang Tsai Mahadevan Iyer Jordi Ros

This paper introduces a scalable maxmin flow control protocol which guarantees the minimum rate for each connection-oriented flow without requiring per-flow information. The protocol is called MR-ASAP (Minimum Rate guaranteeing Adaptive Source-link Accounting Protocol). MR-ASAP is an extension of ASAP [Tsa98a, Kim99], the first exact maxmin flow control protocol for best-effort connection-orien...

Journal: :CoRR 2010
Robert Geisberger Dennis Schieferdecker

We present a new heuristic point-to-point routing algorithm based on contraction hierarchies (CH). Given an ε ≥ 0, we can prove that the length of the path computed by our algorithm is at most (1 + ε) times the length of the optimal (shortest) path. CH is based on node contraction: removing nodes from a network and adding shortcut edges to preserve shortest path distances. Our algorithm tries t...

2009
Liliana D'Errico Michele Loreti

Process algebras are a set of mathematically rigourous languages with well defined semantics that permit modelling behaviour of concurrent and communicating systems. Verification of concurrent systems within the process algebraic approach can be performed by checking that processes enjoy properties described by some temporal logic’s formulae. In this paper we present a formal framework that per...

Journal: :PVLDB 2012
Jianneng Cao Panagiotis Karras

Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition. Yet, no method proposed to date explicitly bounds the percentage of information an adversary gains after seeing the published data for each sensitive...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید