نتایج جستجو برای: keywords proxy war

تعداد نتایج: 2039825  

Journal: :International Journal of Corpus Linguistics 2022

Abstract This paper applies a new approach to the identification of discourses, based on Multiple Correspondence Analysis (MCA), study discourse variation over time. The MCA keywords deals with major issue use identify discourses: allocation individual multiple discourses. Yet, as this demonstrates, also allows us observe in prevalence discourses texts patterns keyword co-occurrence. Metadata c...

2001
Agung Prasetijo Mark Looi Andrew Clark Gary Gaskell Paul Ashley Joris Claessens

The security threats to networked systems have increased. The demand for accessing hosts remotely in a secure manner is therefore also increasing. In order to meet this demand, many users and network administrators use the Secure Shell (SSH) service. However, the SSH system may be configured with insecure defaults. A proxy in-between an SSH server and its clients is one possible way to enforce ...

2012
Geethu Thomas

Cloud computing is a recent computing model; provides consistent access to wide area distributed resources facing many problems as its usage increases. Enormous loss to both cloud clients as well as cloud service providers happen even with small intrusions. The protection and defense of cloud infrastructure against malicious attacks can be solved by designing ‘intrusion tolerance’. We prove the...

Journal: :JIPS 2010
Hidayat Febiansyah Jin Baek Kwon

Video-on-Demand services are increasing rapidly nowadays. The load on servers can be very high, even exceeding their capacity. For popular contents, we can use a Periodic Broadcast (PB) strategy using multicast to serve all clients. Recent development of PB uses multiple channels broadcasting for segments of movies in certain patterns, so that users only need to wait for a small segment to star...

Journal: :IACR Cryptology ePrint Archive 2009
Benny Applebaum Haakon Ringberg Michael J. Freedman Matthew Caesar Jennifer Rexford

Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an accurate estimate of the popularity of Web sites. However, legitimate concerns about privacy often inhibit participation in collaborative data-analysis systems. In this paper, we design, implement, and evaluate a practica...

2012
Ritu Dahiya Ravinder Dahiya

RFID (Radio Frequency Identification) is recently becoming popular due to its convenience and economical efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode. On the other hand, RFID is jeopardized from various attacks and problems as an obstacle of widespread RFID deployment: replay, spoofing, traceability, de-synchronization, un-scalability...

Journal: :Vision Research 2006

Authors are requested to select key words from the following list. You may use plurals and adjectives for combinations like absolute pupillary response, centrifugal optic nerve, inter blobs, etc. If key words are needed which do not appear in this list, please underline them. For animal classification the Latin nomenclature should be used. p-mechanism A-scan a-wave aberration absolute absorptio...

2010
Teruhiko Yoneyama Mukkai S. Krishnamoorthy

The Influenza Pandemic of 1918-1919, also called Spanish Flu Pandemic, was one of the severest pandemics in history. It is thought that the First World War much influenced the spread of the pandemic. In this paper, we model the pandemic considering both civil and military traffic. We propose a hybrid model to determine how the pandemic spread through the world. Our approach considers both the S...

Journal: :Management Science 2005
Robert W. Day S. Raghavan

Motivated by the increasing use of auctions by government agencies, we consider the problem of fairly pricing public goods in a combinatorial auction. A well-known problem with the incentive-compatible Vickrey-Clarke-Groves (VCG) auction mechanism is that the resulting prices may not be in the core. Loosely speaking, this means the payments of the winners could be so low, that there are losing ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید