نتایج جستجو برای: ssl

تعداد نتایج: 1571  

1995
Mark C. Hansen John P. Hayes

A high-level fault modeling and testing philosophy is proposed which is aimed at ensuring full detection of lowlevel, physical faults, as well as the industry-standard single stuck-line (SSL) faults. A set of independent functional faults and the corresponding functional tests are derived (induced) from the circuit under test; of particular interest are SSL-induced functional faults or SIFs. We...

2011
Mahito Sugiyama Akihiro Yamamoto

• We propose a semi-supervised learning (SSL) method, called SELF (SEmi-supervised Learning via FCA), using Formal Concept Analysis (FCA) – It can handle mixed-type data containing both discrete and continuous variables ∘ Numerical data are discretized by binary encoding / Summary • We propose a semi-supervised learning (SSL) method, called SELF (SEmi-supervised Learning via FCA), using Form...

2006
Chong-Sun Hwang

Various security APIs (Application Programming Interfaces) are being used in a variety of application areas requiring the information security function. However, these standards are not compatible, and the developer must use those APIs selectively depending on the application environment or the programming language. To resolve this problem, we propose the standard draft of the information secur...

2015
Vimitha R Vidhya Lakshmi Zon-Yin Shae Z. Xiao L. Guo J. Tracey Chi-Jen Wu Jan-Ming Ho Ming-Syan Chen John Mark Seong-Moo Yoo Kuan Zhang Xiaohui Liang Xuemin Shen Rongxing Lu Honggang Wang Shaoen Wu Min Chen Wei Wang

Mobile cloud Computing is a new emerging technology. This technology supports many applications and one such application is presence enabled application. Mobile presence server is the main component in presence enabled applications and they provide presence services to all mobile users in the network. As number of mobile user increases to a great extent there arises buddy list search problem. I...

1998
A. Lioy F. Maino

This paper describes an access control model based on X.509v3 certi cates for user authorization on HTTP servers secured by SSL. The authorization model presented is based on the concept of authentication roles , that are the handlers that identify a single certi cate (or a group of them) inside the access control list (ACL). The separation between authentication (role mapping) and authorizatio...

2010
Marc Fischlin Anja Lehmann Daniel Wagner

The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake protocol to establish shared keys that are subsequently used to encrypt and authenticate the data transfer. To ensure that the obtained keys are as secure as possible, TLS and SSL deploy hash function combiners for key derivatio...

2017
Upender K. Kaul Nhan T. Nguyen

This chapter describes a new intelligent platform for learning optimal designs of morphing wings based on Variable Camber Continuous Trailing Edge Flaps (VCCTEF) in conjunction with a leading edge flap called the Variable Camber Krueger (VCK). The new platform consists of a Computational Fluid Dynamics (CFD) methodology coupled with a semi-supervised learning methodology. The CFD component of t...

Journal: :Cancer research 2002
Rong Zhou Richard Mazurchuk Robert M Straubinger

Increased neovascularization and vascular hyperpermeability are integral processes in tumors, and various therapeutic strategies seek to reverse the angiogenic phenotype. Long-circulating liposomes extravasate in tumors such as the rat 9L gliosarcoma and accumulate in perivascular areas. Under such conditions, liposome-encapsulated doxorubicin (DOX) provides approximately 30% increase in life s...

2017
Carl Börstell Robert Östling

In this paper, we describe a method for mapping the phonological feature location of Swedish Sign Language (SSL) signs to the meanings in the Swedish semantic dictionary SALDO. By doing so, we observe clear differences in the distribution of meanings associated with different locations on the body. The prominence of certain locations for specific meanings clearly point to iconic mappings betwee...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید