نتایج جستجو برای: protection method

تعداد نتایج: 1791871  

2013
ALBERTO BROGGI PIETRO CERRI STEFANO GHIDONI PAOLO GRISLERI HO GI JUNG John O’Farrell

Scenario-Driven Search Method for ALBERTO BROGGI, PIETRO CERRI, STEFANO GHIDONI, PAOLO GRISLERI, HO GI JUNG VisLab – Dipartimento di Ingegneria dell’Informazione, Università degli Studi di Parma, Parma, Italy Intelligent Autonomous System Laboratory (IAS-Lab), Department of Information Engineering, University of Padua, Padova, Italy The School of Mechanical Engineering, Hanyang University, Seon...

1995
Hendrik M. Haitjema Stephen R. Kraemer

A new computer program has been developed to determine time-of-travel capture zones in relatively simple geohydrological settings. The WhAEM package contains an analytic element model that uses superposition of (many) closed form analytical solutions to generate a ground-water flow solution. WhAEM consists of two executables: the preprocessor GAEP, and the flow model CZAEM. WhAEM differs from e...

2008
Amanda S. Azman

It is known that exposure to high sound pressure levels can lead to permanent hearing loss; however, many workers, in mining as well as other occupational sectors, frequently receive hazardous noise exposures. The National Institute for Occupational Safety and Health (NIOSH) recommends using a criterion level of 85 dB(A) for implementation of hearing loss prevention programs. But, despite engin...

1997
Jussipekka Leiwo Yuliang Zheng

Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent nor mal operation of the system A method will be presented to specify and enforce a resource allocation policy to prevent denial of service attacks Resource allocation policy can be formally derived from a waiting time policy where maximum acceptable response times for ...

Journal: :Softw., Pract. Exper. 2012
Zhiwei Yu Chaokun Wang Clark D. Thomborson Jianmin Wang Shiguo Lian Athanasios V. Vasilakos

Interpretation √ √ √ Semi-Dynamic Multiple √ √ √ Collberg-Thomborson √ √ √

2013
JING GUO

Privacy preserving classification mining is one of the fast-growing subareas of data mining. The algorithm-related methods of privacy-preserving are designed for particular classification algorithm and couldn’t be used in other classification algorithms. To solve this problem, it proposes a new algorithm-irrelevant privacy protection method based on randomization. This method generates and open...

2005
Jiayi Yao Runtong Zhang

According to the statistical data security and auditing requirement, an effective Security Protection Method and a Rules-based Statistical Data Auditing (RSDA) solution are given. In this article, we introduce the classification and expression of statistical auditing rule.

2008
TINGYUAN NIE

The progress of semiconductor manufacture process technology has made it possible to mount a huge number of transistors on a chip that includes a perfect system on it. Nevertheless, while the design reuse is effective in reducing both the SOC design cost and TAT (Turn Around time) of development, the design method also exposes the risk on security. IP (Intellectual Property) reuse plays an impo...

2008
Hiromi UEDA Toshinori TSUBOI Hiroyuki KASAI

The Passive Optical Network (PON) shares transmission facilities to provide broadband services economically. To enhance network survivability, ITU-T Rec. G.983.5 defines some protection switching methods. These methods, however, always bring about signal loss when switching is performed. Moreover, a network operator often has to replace one optical fiber cable with another that takes a differen...

2016
Dao Lu

Urban planning is the space expression of urban resource configuration. Its central goal is using the effective resource with the lowest ecological cost in exchange for the greatest economic benefits. The current city’s expansion which is dominated by the development, is too fast, which has overlooked the balance between planning and environmental protection. The contradiction between urban dev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید