doxazosin 发表于 2025-3-23 13:20:55

H. Gutman,G. Arvidson,K. Fontell,G. Lindblomvironment. However, as the number of iteration and the interleaver size are increased, it is required much delay and computation for iterative decoding. Therefore, it is important to devise an efficient criterion to stop the iteration process and prevent unnecessary computations and decoding delay.

头盔 发表于 2025-3-23 17:40:55

P. Stenius,H. Palonen,G. Ström,L. Ödbergt Card life time. And, it approaches a file and against at the time when it controls a data the dependence degree is high very. Rankle and Effing suggested atomic operations which are based on the idea that when data is stored in an EEPROM, data must never be written only partially. Efficient design

helper-T-cells 发表于 2025-3-23 20:57:50

H. Gutman,G. Arvidson,K. Fontell,G. Lindblomin this system agents are distributed, it can reduce network delay and network load, and each agent can operate independently. Agents can also be easily added or deleted. In this paper we propose an enhanced design of mobile agent based intrusion detection system using Hidden Markov Model algorithm

温室 发表于 2025-3-24 02:03:38

http://reply.papertrans.cn/24/2330/232972/232972_14.png

毛细血管 发表于 2025-3-24 03:36:58

Molecular Modelling of Micellar Solutionssed as a sub-protocol compare to the case that when it is used as a standalone protocol. To fix such problems, in this paper, we propose a verifiable Non-interactive OT protocol that reduces the network traffic and computational complexity by preprocessing the necessary computations when the network

NEEDY 发表于 2025-3-24 08:45:39

Stig E. Friberg,Zhuning Ma,Linda Rheintacks through the Internet are possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Key Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for re

Canyon 发表于 2025-3-24 12:27:51

Recovery of Oil Using Surfactant-Based Foamsion Protocol), it is necessary to develop test scenario, test environment and adaptation test technology for security test of the system. In this paper, we design and implement security test environment and test program for SIP. This system also can be used as a fundamental system when someone devel

壕沟 发表于 2025-3-24 16:04:38

http://reply.papertrans.cn/24/2330/232972/232972_18.png

AGATE 发表于 2025-3-24 22:57:18

Pooya Khodaparast,Kristian Jessenby incident. The main idea is that the first investigator who collects a volatile data by applying scripts built in USB media should be in crime scene at the time. In according to volatile data, he generates hash value, and gets witness signature. After that, he analyses the volatile data with authe

CHANT 发表于 2025-3-25 03:13:09

Abhijit Kakati,Jitendra S. Sangwaiin Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail, and acquires personal information which is sensitive and financial information. This study propo
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Computational Science and Its Applications - ICCSA 2007; International Confer Osvaldo Gervasi,Marina L. Gavrilova Conference proceedings 20