نتایج جستجو برای: mitigating
تعداد نتایج: 15720 فیلتر نتایج به سال:
We describe an efficient and scalable framework for modeling crosstalk effects on quantum information processors. By applying optimal control techniques, we show how to tuneup arbitrary high-fidelity parallel operations systems with substantial local nonlocal crosstalk. Simulations drastically lower error rates a 2D square array of 100 superconducting transmon qubits. These results suggest that...
Flooding-based DDoS attacks is a very common way to attack a victim machine by directly or indirectly sending a large amount of malicious traffic to it. Stochastic Fairness Queueing (SFQ) is a typical implementation of Fair Queueing. This paper focuses on exploring the feasibility of mitigating flooding-based DDoS attacks by queueing disciplines. A comparative study is made between SFQ and FCFS...
Controlled vocabularies used in cultural heritage organizations (galleries, libraries, archives, and museums) are a helpful way to standardize terminology but can also result misrepresentation or exclusion of systemically marginalized groups. Library Congress Subject Headings (LCSH) is one example widely yet problematic controlled vocabulary for subject headings. In some cases, groups creating ...
Dedicated to my lord Without you, I cannot reach this stage. iii ACKNOWLEDGEMENTS I would like to thank my advisor, Dr. Wenke Lee, and my co-advisor Nick Feam-ster, for their understandings, support, and encouragement throughout my graduate studies in the program of information security. I have been amazingly fortunate to have them as my advisors. Without their constructive criticism, rapport a...
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. This thesis provides research on how to mitigate private key compromise in three different cases. The first c...
A smartphone, with its versatile connectivity and incredible computational capability, can easily become an indispensable part of a user’s day. But that same user can quickly become addicted to his/her device, constantly checking Facebook notifications, playing games, etc. This constant distraction can adversely affect a user’s productivity and even his/her happiness. With the advent of always-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید