毛细血管 发表于 2025-3-28 17:26:03
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks, it is very easy if it knows the IP address of the web server. As practiced, we use the domain name when searching for websites other than the IP address. This paper suggests an IP lookup in Mobile IPv6 environment. This method utilizes the DNS lookup.头盔 发表于 2025-3-28 20:09:06
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval,as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.STENT 发表于 2025-3-29 00:46:39
Conference proceedings 2011rence, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.珊瑚 发表于 2025-3-29 03:54:44
1865-0929 rences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of securicrockery 发表于 2025-3-29 10:01:06
http://reply.papertrans.cn/87/8635/863441/863441_45.png费解 发表于 2025-3-29 12:38:06
A Survey on Access Control Deployment,onment. This paper presents a survey of access control mechanisms along with their deployment issues and solutions available today. We aim to give a comprehensive big picture as well as pragmatic deployment details to guide in understanding, setting up and enforcing access control in its real world application.蔑视 发表于 2025-3-29 19:23:35
Data Anonymity in Multi-Party Service Model,d anonymized datasets. We considered a new service model that involves more than two data holders and a data user, and proposed a new privacy requirement. Furthermore, we discussed feasible approaches searching a table that satisfies the privacy requirement and showed a concrete algorithm to find the table.agnostic 发表于 2025-3-29 19:42:55
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification,e in training, (ii) design of a Stage Selection Optimization (SSO) method which is compatible with the training approach to improve the classification speed and the detection accuracy, (iii) development of an automatic classification system which achieves promising logo detection and brand classification results.残酷的地方 发表于 2025-3-30 00:35:13
http://reply.papertrans.cn/87/8635/863441/863441_49.png奇怪 发表于 2025-3-30 05:15:53
http://reply.papertrans.cn/87/8635/863441/863441_50.png