نتایج جستجو برای: entity authentication
تعداد نتایج: 185705 فیلتر نتایج به سال:
Centralized storage is a data model in which stored and managed single physical location or centralized system. In this model, all information are on servers centers by one entity organization. This also has disadvantages such as risk of system failure against distributed denial service (DDoS) attacks, natural disasters, hardware failures causing point failure. threat results loss lack user con...
Named entity recognition is a process in which the people’s names, name of places (cities, countries, seas, etc.) and organizations (public and private companies, international institutions, etc.), date, currency and percentages in a text are identified. Named entity recognition plays an important role in many NLP tasks such as semantic role labeling, question answering, summarization, machine ...
In ubiquitous/pervasive computing environments, it is envisaged that computing elements— entities—will start interacting in an ad hoc fashion. The peer-to-peer (p2p) paradigm is appealing for such types of interaction especially with JXTA, which supports the development of reusable p2p building blocks, which facilitate implementation on any smart device. However, the inability to rely on a cent...
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various key management authorities distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Thus many efforts have been made to adapt key management authority’s tasks to the dynamic environmen...
or concrete entities. I could also give a similar story-relative account of the issue as to whether fictional characters are individual versus general entities such as universals; here too I can simply reply that it depends on whether or not the relevant characters are represented as individuals or as universals, in the fictional story. 35. Thomasson, Fiction and Metaphysics, chap. 1. 36. That ...
This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure that the participating entities are legitimate in a com...
Trust is important wherever agents must interact. We consider the important case of interactions in electronic communities, where the agents assist and represent principal entities, such as people and businesses. We propose a social mechanism of reputation management, which aims at avoiding interaction with undesirable participants. Social mechanisms complement hard security techniques (such as...
RFC 5965 defines an extensible, machine-readable format intended for mail operators to report feedback about received email to other parties. This applicability statement describes common methods for utilizing this format for reporting both abuse and authentication failure events. Mailbox Providers of any size, mail-sending entities, and end users can use these methods as a basis to create proc...
In the so-called real world, any given process occurs simultaneously with a myriad of other processes. All these processes take place on a continuum of mass, energy and time (the world). All things in this continuum are interlinked in some way. Defining a process as such is in itself already an act of abstraction. One way to study a process is to split it into three entities: the observer, the ...
RFC 5965 defines an extensible, machine-readable format intended for mail operators to report feedback about received email to other parties. This applicability statement describes common methods for utilizing this format for reporting both abuse and authentication failure events. Mailbox Providers of any size, mail-sending entities, and end users can use these methods as a basis to create proc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید