نتایج جستجو برای: ssl
تعداد نتایج: 1571 فیلتر نتایج به سال:
A high-level fault modeling and testing philosophy is proposed which is aimed at ensuring full detection of lowlevel, physical faults, as well as the industry-standard single stuck-line (SSL) faults. A set of independent functional faults and the corresponding functional tests are derived (induced) from the circuit under test; of particular interest are SSL-induced functional faults or SIFs. We...
• We propose a semi-supervised learning (SSL) method, called SELF (SEmi-supervised Learning via FCA), using Formal Concept Analysis (FCA) – It can handle mixed-type data containing both discrete and continuous variables ∘ Numerical data are discretized by binary encoding / Summary • We propose a semi-supervised learning (SSL) method, called SELF (SEmi-supervised Learning via FCA), using Form...
Various security APIs (Application Programming Interfaces) are being used in a variety of application areas requiring the information security function. However, these standards are not compatible, and the developer must use those APIs selectively depending on the application environment or the programming language. To resolve this problem, we propose the standard draft of the information secur...
Mobile cloud Computing is a new emerging technology. This technology supports many applications and one such application is presence enabled application. Mobile presence server is the main component in presence enabled applications and they provide presence services to all mobile users in the network. As number of mobile user increases to a great extent there arises buddy list search problem. I...
This paper describes an access control model based on X.509v3 certi cates for user authorization on HTTP servers secured by SSL. The authorization model presented is based on the concept of authentication roles , that are the handlers that identify a single certi cate (or a group of them) inside the access control list (ACL). The separation between authentication (role mapping) and authorizatio...
The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake protocol to establish shared keys that are subsequently used to encrypt and authenticate the data transfer. To ensure that the obtained keys are as secure as possible, TLS and SSL deploy hash function combiners for key derivatio...
Semi-Supervised Learning of Lift Optimization of Multi-Element Three-Segment Variable Camber Airfoil
This chapter describes a new intelligent platform for learning optimal designs of morphing wings based on Variable Camber Continuous Trailing Edge Flaps (VCCTEF) in conjunction with a leading edge flap called the Variable Camber Krueger (VCK). The new platform consists of a Computational Fluid Dynamics (CFD) methodology coupled with a semi-supervised learning methodology. The CFD component of t...
Increased neovascularization and vascular hyperpermeability are integral processes in tumors, and various therapeutic strategies seek to reverse the angiogenic phenotype. Long-circulating liposomes extravasate in tumors such as the rat 9L gliosarcoma and accumulate in perivascular areas. Under such conditions, liposome-encapsulated doxorubicin (DOX) provides approximately 30% increase in life s...
In this paper, we describe a method for mapping the phonological feature location of Swedish Sign Language (SSL) signs to the meanings in the Swedish semantic dictionary SALDO. By doing so, we observe clear differences in the distribution of meanings associated with different locations on the body. The prominence of certain locations for specific meanings clearly point to iconic mappings betwee...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید