نتایج جستجو برای: mitigating
تعداد نتایج: 15720 فیلتر نتایج به سال:
Today’s marketplace is characterised by turbulence and uncertainty. Market turbulence has tended to increase for a number of reasons. Demand in almost every industrial sector seems to be more volatile than was the case in the past. Product and technology life-cycles have shortened significantly and competitive product introductions make life-cycle demand difficult to predict. At the same time t...
Mitigation and adaptation represent two solutions to the issue of global warming. While mitigation aims at reducing CO2 emissions and preventing climate change, adaptation encompasses a broad scope of techniques used to reduce the impacts of climate change once they have occurred. Both have direct costs on a country’s Gross Domestic Product, but costs also arise from temperature increases due t...
For efficient data dissemination over a network, the most commonly used solution is broadcasting the messages by flooding the data over the network. Issues concerned with flooding are redundant rebroadcasting of messages and collision leading to broadcast storm problem. This paper proposes a strategy to overcome the broadcast storm problem in an Vanets using the bounding algorithm. Our analysis...
T he Midwest floods of 2008 added more than just water to the region’s lakes, reservoirs, and rivers. Runoff from farms and towns carries a heavy load of silt, nutrients, and other pollutants. The nutrients trigger blooms of algae, which taint drinking water. Death and decay of the algae depletes oxygen, kills fish and bottom-dwelling animals, and thereby creates ‘‘dead zones’’ in the body of w...
The annual Computer Crime and Security Survey for 2008 [1] surveyed 522 security employees from US corporations and government agencies, finding that insider incidents were cited by 44 percent of respondents, nearly as high as the 49 percent that encountered a conventional virus in the previous year. In general, there is an increasing recognition of the significance, scope and cost of the malic...
M itochondria are remarkable microorganisms. About two billion years ago, their distant free-living ancestors hooked up with a truly foreign lineage of archaebacteria and started a genomic merger that led to the most successful coevolved mutualism on the planet: the eukaryotic cell. Along the way, evolving mitochondria lost a lot of genomic baggage, entrusted their emerging hosts with their own...
Individuals vary across many dimensions due to the effects of gender-based, personality, and cultural differences. Consequently, programming contests with a limited and restrictive structure (e.g., scoring system, questioning style) are most favourable and attractive to a specific set of individuals with the characteristics that best match this structure. We suggest that a more inclusive and fl...
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently...
Logic locking is a technique that has been proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct key is provided. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can decipher the correct key of most logic locking techniques within a few ho...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید