نتایج جستجو برای: ms lync server

تعداد نتایج: 176959  

2002
K. Yeung B. Jacques

1 Please send the corresponds to this author at [email protected] 2 Ms. Brenda Jacques was a senior student at the University of Windsor in 1997, who developed the gaming strategy as a part of her senior project under the supervision of Dr. R. Du. 3 R. Du, The Chinese University of Hong Kong, Shatin, Hong Kong, [email protected] Abstract  This paper presents an interactive real-time m...

2004
Hanna Kozankiewicz Kazimierz Subieta

In this paper we describe a prototype implementation of updateable views called “SBQL Views”. The prototype follows a novel approach to view updates based on the Stack-Based Approach to object-oriented and XMLoriented query languages. The SBQL Views prototype is implemented on top of the SBQL query language for the XML DOM model. The novelty of the approach consists in augmenting a view definit...

Journal: :CoRR 2015
Jacob Devlin Saurabh Gupta Ross B. Girshick Margaret Mitchell C. Lawrence Zitnick

We explore a variety of nearest neighbor baseline approaches for image captioning. These approaches find a set of nearest neighbor images in the training set from which a caption may be borrowed for the query image. We select a caption for the query image by finding the caption that best represents the “consensus” of the set of candidate captions gathered from the nearest neighbor images. When ...

Journal: :IJCSA 2008
Narendra S. Chaudhari Avishek Ghosh

Data projection is an important tool in exploratory data analysis. Sammon’s non linear projection method lacks predictability and is ineffective for large data sets. To introduce predictability we implement an extension of Sammon’s algorithm using fuzzy logic approach. The fuzzy based rule model is implemented in the .Net framework using Microsoft Visual Studio with Visual C# as the programming...

2013
Messias Borges Silva

The growth of the Organization’s data collections, due to the development of new materials and advanced computing devices, puts the database (Db) technology at the forefront. Conse‐ quentially to its popularity, different options of database management systems (DBMS) can be found on the market to store one of the most important Organization’s assets, the data. Among the factors that may influen...

2016
Matthias Horst Martin Grothe Tibor Jager Jörg Schwenk

We describe an efficient cross-protocol attack, which enables an attacker to learn the VPN session key shared between a victim client and a VPN endpoint. The attack recovers the key which is used to encrypt and authenticate VPN traffic. It leverages a weakness of the RADIUS protocol executed between a VPN endpoint and a RADIUS server, and allows an “insider” attacker to read the VPN traffic of ...

2011
Fang-Yie Leu Yi-Fu Ciou Yi-Li Huang

In this paper, we propose a handover authentication mechanism, called handover key management and authentication scheme (HaKMA), which as a three-layer authentication architecture is a new version of our previous work Diffie-Hellman-PKDS-based authentication method (DiHam for short) by improving its key generation flow and adding a handover authentication scheme to respectively speed up handove...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید