بحث بسيط
السجلات المعروضة 31 -- 40 من 51
Performance and security improvements for Tor: A survey
(
Association for Computing Machinery
, 2016 , Article)
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more ...
A Characterization Study of Arabic Twitter Data with a Benchmarking for State-of-the-Art Opinion Mining Models
(
Association for Computational Linguistics (ACL)
, 2017 , Conference Paper)
Opinion mining in Arabic is a challenging task given the rich morphology of the language. The task becomes more challenging when it is applied to Twitter data, which contains additional sources of noise, such as the use ...
Software project management: Theory of constraints, risk management, and performance evaluation
(
Mundo Press
, 2014 , Article)
Constraints and risks are two critical factors that affect software project performance; more attention needs to be paid to constraints and risks in order to improve performance. In this paper, investigation will take place ...
Rational Contracts: Data-driven Service Provisioning in Blockchain-powered Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Smart Contracts (SCs), which are software programs that run on blockchain platforms, provide appealing security guarantees characterized by decentralized, autonomous, and verifiable execution. On the other hand, Service ...
Modern techniques and technologies applied to training and performance monitoring
(
Human Kinetics
, 2016 , Article)
Athlete preparation and performance continues to increase in complexity and costs. Modern coaches are shifting from reliance on personal memory, experience, and opinion to evidence from collected training load data. Training ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
On physical layer security of correlated multiantenna cognitive radio receivers
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely spaced and often experience correlation among them. In this work, the secrecy performance of correlated multiantenna CR ...
Pass-fail decisions for borderline performers after a summative objective structured clinical examination
(
American Association of Colleges of Pharmacy
, 2019 , Article)
Objective. To determine what expert assessors value when making pass-fail decisions regarding pharmacy students based on summative data from objective structured clinical examinations (OSCE), and to determine the reliability ...
A New Approach to Robust MPC Design for LPV Systems in Input-Output Form
(
Elsevier B.V.
, 2018 , Conference Paper)
In this paper, a robust model predictive control (MPC) technique is introduced to control MIMO linear parameter-varying (LPV) systems subject to input-output constraints. The LPV system is represented in input-output form, ...
Achieving energy efficiency in data centers with a performance-guaranteed power aware routing
(
Elsevier B.V.
, 2017 , Article)
Nowadays, data centers are designed to offer the highest performance in case of high traffic load and peak utilisation of the network. However, in a realistic data center environment, the peak capacity of the network is ...