نتایج جستجو برای: knowledge storage and security
تعداد نتایج: 16904841 فیلتر نتایج به سال:
⎯High quality of security and guaranteed real-time requirements are two key goals of missioncritical embedded storage systems. But most existing real-time disk scheduling algorithms do not consider improving security performance of disk requests. A security-aware periodic-write (SAPW) scheduling algorithm is proposed to judiciously select appropriate security level for each disk request to maxi...
Universities have long been recognised as avenues for teaching and learning, research and discovery, as well as providers of services to the society through the application of knowledge. To strive for academic excellence, it is imperative for public universities to become a learning organization (LO). This can be done by integrating the conceptual relationship between learning organization and ...
The rapid growth of data and data sharing have been driven an evolution in distributed storage infrastructure. The need for sensitive data protection and the capacity to handle massive data sets have encouraged the research and development of secure and scalable storage systems. This paper identifies major security issues and requirements of data protection related to distributed data storage s...
We (1) define a logic1, called CPL (for Cryptographic Protocol Logic), where truth is established on the grounds of evidence-based knowledge (as opposed to awarenessbased belief), spanning the dimensions2 of first-order, temporal, epistemic, deontic, and linear logic; (2) state a few of its key properties; and (3) illustrate how it can be used to compositionally specify and verify cryptographic...
در این تحقیق دانش زبانشناسی و کاربردشناسی زبان آموزان ایرانی در سطح بالای متوسط مقایسه شد. 50 دانش آموز با سابقه آموزشی مشابه از شش آموزشگاه زبان مختلف در دو آزمون دانش زبانشناسی و آزمون دانش گفتار شناسی زبان انگلیسی شرکت کردند که سوالات هر دو تست توسط محقق تهیه شده بود. همچنین در این تحقیق کارایی کتابهای آموزشی زبان در فراهم آوردن درون داد کافی برای زبان آموزان ایرانی به عنوان هدف جانبی تحقیق ...
The technology is increasing to use the information in relational data for saving in database. This database are used in collaboration of environment is used to exact the data and the data is need to security threat for ownership rights. The watermarking is enforcing the data saving the ownership rights in relational data saving in database. In this watermarking technique was containing both re...
When someone decides to ignore an HTTPS error warning, how long should the browser remember that decision? If they return to the website in five minutes, an hour, a day, or a week, should the browser show them the warning again or respect their previous decision? There is no clear industry consensus, with eight major browsers exhibiting four different HTTPS error exception storage policies. Ide...
Leadership is known as the major factor that can influence and motivate knowledge workers to contribute and participate actively in creating, sharing and using knowledge effectively. A survey of 180 Multimedia Supercorridor (MSC) status firms was conducted to identify what leadership characteristics (in the form of social power) are needed in a knowledge-based firm. The results showed that know...
Innovation events the introduction of new products or processes represent the end of a process of knowledge sourcing and transformation. They also represent the beginning of a process of exploitation which may result in an improvement in the performance of the innovating business. This recursive process of knowledge sourcing, transformation and exploitation we call the innovation value chain. M...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید