نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

Journal: :Jurnal Teknik Informatika 2023

Centralized storage is a data model in which stored and managed single physical location or centralized system. In this model, all information are on servers centers by one entity organization. This also has disadvantages such as risk of system failure against distributed denial service (DDoS) attacks, natural disasters, hardware failures causing point failure. threat results loss lack user con...

Named entity recognition is a process in which the people’s names, name of places (cities, countries, seas, etc.) and organizations (public and private companies, international institutions, etc.), date, currency and percentages in a text are identified. Named entity recognition plays an important role in many NLP tasks such as semantic role labeling, question answering, summarization, machine ...

Journal: :Sci. Comput. Program. 2005
Jean-Marc Seigneur Christian Damsgaard Jensen

In ubiquitous/pervasive computing environments, it is envisaged that computing elements— entities—will start interacting in an ad hoc fashion. The peer-to-peer (p2p) paradigm is appealing for such types of interaction especially with JXTA, which supports the development of reusable p2p building blocks, which facilitate implementation on any smart device. However, the inability to rely on a cent...

2016
Vandana Arora Sunil Ahuja

A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various key management authorities distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Thus many efforts have been made to adapt key management authority’s tasks to the dynamic environmen...

2002
JOHN DILWORTH

or concrete entities. I could also give a similar story-relative account of the issue as to whether fictional characters are individual versus general entities such as universals; here too I can simply reply that it depends on whether or not the relevant characters are represented as individuals or as universals, in the fictional story. 35. Thomasson, Fiction and Metaphysics, chap. 1. 36. That ...

Journal: :IJTMCC 2014
Al-Sakib Khan Pathan

This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure that the participating entities are legitimate in a com...

2000
Bin Yu Munindar P. Singh

Trust is important wherever agents must interact. We consider the important case of interactions in electronic communities, where the agents assist and represent principal entities, such as people and businesses. We propose a social mechanism of reputation management, which aims at avoiding interaction with undesirable participants. Social mechanisms complement hard security techniques (such as...

2012
J. Falk

RFC 5965 defines an extensible, machine-readable format intended for mail operators to report feedback about received email to other parties. This applicability statement describes common methods for utilizing this format for reporting both abuse and authentication failure events. Mailbox Providers of any size, mail-sending entities, and end users can use these methods as a basis to create proc...

2012
Tadeu Augusto de Almeida Silva Oscar Luiz Monteiro de Farias

In the so-called real world, any given process occurs simultaneously with a myriad of other processes. All these processes take place on a continuum of mass, energy and time (the world). All things in this continuum are interlinked in some way. Defining a process as such is in itself already an act of abstraction. One way to study a process is to split it into three entities: the observer, the ...

Journal: :RFC 2012
J. D. Falk Murray S. Kucherawy

RFC 5965 defines an extensible, machine-readable format intended for mail operators to report feedback about received email to other parties. This applicability statement describes common methods for utilizing this format for reporting both abuse and authentication failure events. Mailbox Providers of any size, mail-sending entities, and end users can use these methods as a basis to create proc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید