Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Password-based user authentication service is widely used in Internet. Most of the password-based authentication protocols are constructed under the single-server structure that a authencitation server stores cleartext passwords or verification data derived from password and responds to users' authentication request. The security of single-server authentication system is very fragile. In particular,...
As novel web social Media emerges on the web, large-scale unordered sentences are springing up. Although these massive unordered sentences have rich information, loose semantic association and unordered distribution make users hard to order these sentences toward well semantic coherence manually. Automatic sentence ordering to maximize semantic coherence is a significantly practical problem. Some...
Recently, Cloud computing, as one of the hottest words in IT world, has drawn great attention. Many IT companies such as IBM, Google, Amazon, Microsoft, Yahoo and others vigorously develop cloud computing systems and related products to customers. However, there are still some difficulties for customers to adopt cloud computing, in which many security issues exist, because data for a customer is stored...
MOS device aging caused by hot-carrier injection (HCI) and negative/positive bias-temperature instability (N/PBTI) is increasingly more responsible for IC reliability failure for advanced process technology nodes. Accurate aging modeling and fast yet trustable reliability signoff are thus mandatory in process development and circuit design. This paper will first present an aging model that takes into...
this paper put forward a way of improving the software quality by setting up a software failure models library. It manges the failure models efficiently which is extracted from software system. This method is also convenient for the users to retrieve and help the software developers avoiding the potential design defects and errors on conscious. With the B/S construct, we realize the internet share...
In recent years, new energy's exploitation is becoming more and more important, one type of the new energy is gas bearing in the coal layers. Forecasting for coal-seam gas content is a complicated non-linear forecasting problem, which is difficult to solve. A prediction model of coal-seam gas capacity based on support vector regression and ant colony optimization is presented in this paper. As there...
We present a quantitative method based on stochastic Petri net (SPN) to evaluate the survivability of distributed service. Three types of combination service models: one-to-one, one-to-N, and M-to-N are studied, which can reflect survivability of distributed service from a different perspective. Absorbing-state reliability, maintainability and steady-state availability are considered as measures of...
This paper presents the target-based software process evaluation model (TSPEM) with the decomposition and analysis of the organization goals and application of typical technology of statistical process control (SPC). This paper also achieves assessment of each subprocess by analyzing the mapping relationship among organization goals, metric indicators and subprocesses. At the end of this paper, an...
For the problem of rock burst, which seriously influences the security of mines at present, the text concludes the predicting researches and summarizes the representative characteristic parameters of acoustic emission and the characteristic parameters of attribute rock. On such a base these parameters are adopted to establish the predicted model for rock burst which is based on the fuzzy logic ore...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.