نتایج جستجو برای: mitigating

تعداد نتایج: 15720  

2008
Martin Christopher Hau Lee Hau L. Lee

Today’s marketplace is characterised by turbulence and uncertainty. Market turbulence has tended to increase for a number of reasons. Demand in almost every industrial sector seems to be more volatile than was the case in the past. Product and technology life-cycles have shortened significantly and competitive product introductions make life-cycle demand difficult to predict. At the same time t...

2016

Mitigation and adaptation represent two solutions to the issue of global warming. While mitigation aims at reducing CO2 emissions and preventing climate change, adaptation encompasses a broad scope of techniques used to reduce the impacts of climate change once they have occurred. Both have direct costs on a country’s Gross Domestic Product, but costs also arise from temperature increases due t...

2015
Mohd Umar Farooq Khaleel Ur Rahman Khan

For efficient data dissemination over a network, the most commonly used solution is broadcasting the messages by flooding the data over the network. Issues concerned with flooding are redundant rebroadcasting of messages and collision leading to broadcast storm problem. This paper proposes a strategy to overcome the broadcast storm problem in an Vanets using the bounding algorithm. Our analysis...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2008
Stephen R Carpenter

T he Midwest floods of 2008 added more than just water to the region’s lakes, reservoirs, and rivers. Runoff from farms and towns carries a heavy load of silt, nutrients, and other pollutants. The nutrients trigger blooms of algae, which taint drinking water. Death and decay of the algae depletes oxygen, kills fish and bottom-dwelling animals, and thereby creates ‘‘dead zones’’ in the body of w...

2010
Brian M. Bowen Malek Ben Salem Angelos D. Keromytis Salvatore J. Stolfo

The annual Computer Crime and Security Survey for 2008 [1] surveyed 522 security employees from US corporations and government agencies, finding that insider incidents were cited by 44 percent of respondents, nearly as high as the 49 percent that encountered a conventional virus in the previous year. In general, there is an increasing recognition of the significance, scope and cost of the malic...

Journal: :PLoS Biology 2008
David M Rand

M itochondria are remarkable microorganisms. About two billion years ago, their distant free-living ancestors hooked up with a truly foreign lineage of archaebacteria and started a genomic merger that led to the most successful coevolved mutualism on the planet: the eukaryotic cell. Along the way, evolving mitochondria lost a lot of genomic baggage, entrusted their emerging hosts with their own...

Journal: :Informatics in Education 2006
Maryanne Fisher Anthony Cox

Individuals vary across many dimensions due to the effects of gender-based, personality, and cultural differences. Consequently, programming contests with a limited and restrictive structure (e.g., scoring system, questioning style) are most favourable and attractive to a specific set of individuals with the characteristics that best match this structure. We suggest that a more inclusive and fl...

2009
Debin Liu XiaoFeng Wang L. Jean Camp

Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently...

2016
Yang Xie Ankur Srivastava

Logic locking is a technique that has been proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct key is provided. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can decipher the correct key of most logic locking techniques within a few ho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید