نتایج جستجو برای: ouafi phan privacy model
تعداد نتایج: 2140727 فیلتر نتایج به سال:
Strengthening the user perception of privacy and trust on the Internet will require userfocused technological approaches, enforceable privacy laws, and business interventions. We propose a novel user-focused business model for privacy with a supporting client-side e-privacy architecture. The e-privacy business model is detailed in terms of target markets and stakeholders, value or revenue model...
The Curtis-Tits-Phan theory as laid out originally by Bennett and Shpectorov describes a way to employ Tits’ lemma to obtain presentations of groups related to buildings as the universal completion of an amalgam of low-rank groups. It is formulated in terms of twin-buildings, but all concrete results so far were concerned with spherical buildings only. We describe an explicit flip-flop geometry...
Wire-coating flow is simulated, involving polymer melt coatings and tube-tooling process design. A finite element method is employed, based on a semi-implicit time-stepping Taylor-Galerkin/pressure-correction scheme. The exponential Phan-Thien/Tanner model is used in its multi-mode form to represent a high-density polyethelyne (HDPE) polymer. Both shear-thinning and elongation-softening propert...
Topic models are a popular method for modeling the term frequency occurrences in documents. The fitted model allows to better estimate the similarity between documents as well as between a set of specified keywords using an additional layer of latent variables which are referred to as topics. The R package topicmodels provides basic infrastructure for fitting topic models based on data structur...
In this paper, we consider an exceptional study of differentially private stochastic gradient descent (SGD) algorithms in the convex optimization (SCO). The majority existing literature requires that losses have additional assumptions, such as loss functions with Lipschitz, smooth and strongly convex, uniformly bounded model parameters, or focus on Euclidean (i.e. <math xmlns="http://www.w3.org...
We discuss self-similar solutions for jet breakup for a family of models of nonNewtonian fluids which includes the Phan-Thien Tanner model. The constitutive law is given by Tt + (v · ∇)T− (∇v)T−T(∇v)T + κT +ν(trT)a−1T = μ(∇v + (∇v)T ), (1) where a > 1. For a = 2, a recent paper establishes the existence of a similarity solution for surface tension driven jet breakup. In this paper, we show that...
Received on 12 December 2014, published on 16 December 2014 Copyright © 2014 Phan Cong Vinh, licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited. doi: 10.4108/ca...
Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Many codes based traitor tracing scheme were proposed. However, as stated by Billet and Phan in ICITS 2008, they lack of revocation ability. We provide a generic scheme of codes based traitor tracing with revocation ability, based on ciphertextpolicy attri...
This paper presents an algorithm, which improves the probability of success for simple swarm robots implementing an extended version of the leaf curling task – one part of the nest building activity of weaver ants [Phan and Russell, 2009, 2010]. The robots are required to have only very basic sensing abilities, and are allowed to transfer information using sematectonic stigmergy – a cue-based i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید