نتایج جستجو برای: mitigating

تعداد نتایج: 15720  

Journal: :Journal of Patient Safety and Risk Management 2021

Journal: :Emerging Markets Finance and Trade 2014

Journal: :Physical Review Letters 2021

We describe an efficient and scalable framework for modeling crosstalk effects on quantum information processors. By applying optimal control techniques, we show how to tuneup arbitrary high-fidelity parallel operations systems with substantial local nonlocal crosstalk. Simulations drastically lower error rates a 2D square array of 100 superconducting transmon qubits. These results suggest that...

2012
Yu Ming

Flooding-based DDoS attacks is a very common way to attack a victim machine by directly or indirectly sending a large amount of malicious traffic to it. Stochastic Fairness Queueing (SFQ) is a typical implementation of Fair Queueing. This paper focuses on exploring the feasibility of mitigating flooding-based DDoS attacks by queueing disciplines. A comparative study is made between SFQ and FCFS...

Journal: :Information technology and libraries 2021

Controlled vocabularies used in cultural heritage organizations (galleries, libraries, archives, and museums) are a helpful way to standardize terminology but can also result misrepresentation or exclusion of systemically marginalized groups. Library Congress Subject Headings (LCSH) is one example widely yet problematic controlled vocabulary for subject headings. In some cases, groups creating ...

Journal: :JACC: Clinical Electrophysiology 2017

2015
Xinyu Xing Hongyuan Zha Mustaque Ahamad Wei Meng Byoungyoung Lee Yunhui Zheng Anmol Sheth

Dedicated to my lord Without you, I cannot reach this stage. iii ACKNOWLEDGEMENTS I would like to thank my advisor, Dr. Wenke Lee, and my co-advisor Nick Feam-ster, for their understandings, support, and encouragement throughout my graduate studies in the program of information security. I have been amazingly fortunate to have them as my advisors. Without their constructive criticism, rapport a...

2016
Jiangshan Yu

Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. This thesis provides research on how to mitigate private key compromise in three different cases. The first c...

2013
Connor Bain Sanorita Dey Srihari Nelakuditi Romit Roy Choudhury

A smartphone, with its versatile connectivity and incredible computational capability, can easily become an indispensable part of a user’s day. But that same user can quickly become addicted to his/her device, constantly checking Facebook notifications, playing games, etc. This constant distraction can adversely affect a user’s productivity and even his/her happiness. With the advent of always-...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید