نتایج جستجو برای: graph protection
تعداد نتایج: 376537 فیلتر نتایج به سال:
This paper examines the concept of role-based protection and, in particular, role organization. From basic role relationships, a model for role organization is developed. The role graph model, its operator semantics based on graph theory and algorithms for role administration are proposed. The role graph model, in our view, presents a very generalized form of role organization for access rights...
This article proposes a survivability evaluation model for multifiber WDM networks, in which the extended layered graph is developed to jointly optimize the wavelength routing and wavelength assignment problems, and three different edge cost functions are evaluated in terms of traffic engineering. Linear programming (LP) equations are formulated to optimally determine the working lightpath and ...
The article contains the algorithm for searching a certain kind of bridges in the protection graph of Take-Grant model. The proposed algorithm is based on a classical breadth-first search algorithm.
In this paper, the protection coverage area of a security system is considered. The protection coverage is determined by applying the protection model of security systems, which is brought forward according to Neyman-Pearson Criterion. The protection model can be used to define the protection probability on a grid-modeled field. The security systems deployed in a guard field are regarded abstra...
Purpose – This paper has been produced to enumerate and discuss threats which are caused by industry and may affect health in the province of Kocaeli. Design/methodology/approach – Industries in the province, depending on their function, were grouped into sectors. Air, water and solid waste pollutants produced by each sector were assessed for each region of the province. Findings – Of the 7,400...
Structure analysis of table form document is important because printed documents and also electronical documents only provide geometrical layout and lexical information explicitly. To handle these documents automatically, logical structure information is necessary. In this paper, we first propose a general representation of table form document based on XML, which contains both structure and lay...
Translucent WDM networks are receiving attention as longhaul back bone networks. One important aspect of such networks that has not received attention is the possibility of cycles in the path of a translucent network. This is the first work on implementing path protection in translucent networks, considering the possibility of cycles. Two formulations have been proposed here for dynamic lightpa...
Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید