نتایج جستجو برای: strong

تعداد نتایج: 372662  

Journal: :Int. J. IT Standards and Standardization Res. 2007
Krzysztof Brzezinski

In 2006, businesses engaged in Internet commerce face a fundamental challenge when trying to implement strong authentication technologies because of the absence of widely accepted standards for the reliable authentication of transacting parties in Internet commerce. For more than a decade, governments have struggled unsuccessfully to create legal frameworks within which businesses can implement...

2010
Jeffrey S. Leon

This paper deals with the problem of finding a base and strong generating set for the group generated by a given set of permutations. The concepts of base and strong generating set were introduced by Sims [5], [6] and provide the most effective tool for computing with permutation groups of high degree. One algorithm, originally proposed by Sims [7], is described in detail; its behavior on a num...

2007
Paul Witman

The United States banking industry was directed by its regulatory agencies to provide authentication stronger than single factor for “high risk” transactions, as a defense against phishing, by year-end 2006. Financial institutions had a wide array of options available to them to meet this requirement, and there was considerable latitude in how to interpret the regulatory guidance. This paper pr...

2002
PETER A. HÄSTÖ

We study a certain monotonicity property of ratios of means, which we call a strong inequality. These strong inequalities were recently shown to be related to the so-called relative metric. We also use the strong inequalities to derive new ordinary inequalities. The means studied are the extended mean value of Stolarsky, Gini’s mean and Seiffert’s mean.

2009
HANNA K. JANKOWSKI LARISSA I. STANBERRY

Let p1 ≤ p2 and consider estimating a fixed set {x : p1 ≤ f(x) ≤ p2} by the random set {x : p1 ≤ f̂n(x) ≤ p2}, where f̂n is a consistent estimator of the continuous function f . This paper gives consistency conditions for these sets, and provides a new method to construct confidence regions from empirical averages of sets. The method can also be used to construct confidence regions for sets of th...

2006
Antonia Azzini Stefania Marrara

Access controls ensure that all direct accesses to objects are authorized by means of user identification. However, in some scenarios it is also necessary to continuously check the identity of the user in order to avoid malicious behaviors such as person exchanges immediately after the initial authentication phase. Aim of this work is to propose a methodology based on a balanced mix of strong a...

Journal: :Kybernetika 1995
Friedrich Liese Andreas Wienke

The distribution of an inhomogeneous Wiener process is determined by the mean function m(t) ss EW(t) and the variance function b(t) = V^(W(t)) which depend on unknown parameter d _ 0 . Observations are assumed to be in discrete time points where the sample size tends to infinity. Using the general theory of Ibragimow, Hasminskij [2] sufficient conditions for consistency of MLE i?n are establish...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید