نتایج جستجو برای: ms lync server
تعداد نتایج: 176959 فیلتر نتایج به سال:
1 Please send the corresponds to this author at [email protected] 2 Ms. Brenda Jacques was a senior student at the University of Windsor in 1997, who developed the gaming strategy as a part of her senior project under the supervision of Dr. R. Du. 3 R. Du, The Chinese University of Hong Kong, Shatin, Hong Kong, [email protected] Abstract This paper presents an interactive real-time m...
In this paper we describe a prototype implementation of updateable views called “SBQL Views”. The prototype follows a novel approach to view updates based on the Stack-Based Approach to object-oriented and XMLoriented query languages. The SBQL Views prototype is implemented on top of the SBQL query language for the XML DOM model. The novelty of the approach consists in augmenting a view definit...
We explore a variety of nearest neighbor baseline approaches for image captioning. These approaches find a set of nearest neighbor images in the training set from which a caption may be borrowed for the query image. We select a caption for the query image by finding the caption that best represents the “consensus” of the set of candidate captions gathered from the nearest neighbor images. When ...
Data projection is an important tool in exploratory data analysis. Sammon’s non linear projection method lacks predictability and is ineffective for large data sets. To introduce predictability we implement an extension of Sammon’s algorithm using fuzzy logic approach. The fuzzy based rule model is implemented in the .Net framework using Microsoft Visual Studio with Visual C# as the programming...
Influential Parameters to the Database Performance — A Study by Means of Design of Experiments (DoE)
The growth of the Organization’s data collections, due to the development of new materials and advanced computing devices, puts the database (Db) technology at the forefront. Conse‐ quentially to its popularity, different options of database management systems (DBMS) can be found on the market to store one of the most important Organization’s assets, the data. Among the factors that may influen...
We describe an efficient cross-protocol attack, which enables an attacker to learn the VPN session key shared between a victim client and a VPN endpoint. The attack recovers the key which is used to encrypt and authenticate VPN traffic. It leverages a weakness of the RADIUS protocol executed between a VPN endpoint and a RADIUS server, and allows an “insider” attacker to read the VPN traffic of ...
In this paper, we propose a handover authentication mechanism, called handover key management and authentication scheme (HaKMA), which as a three-layer authentication architecture is a new version of our previous work Diffie-Hellman-PKDS-based authentication method (DiHam for short) by improving its key generation flow and adding a handover authentication scheme to respectively speed up handove...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید