Search
Search Results
-
Layered File Systems
In Chapters 3 and 4 , we addressed the topics of process isolation via Linux... -
Layered Symbolic Security Analysis in \(\textsf {DY}^\star \)
While cryptographic protocols are often analyzed in isolation, they are typically deployed within a stack of protocols, where each layer relies on... -
Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the...
-
Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes Detection
The need to secure Internet applications on global networks has become an important task due to the ever-increasing cybercrimes. A common technique...
-
Revisiting the ALPS - An Investigation of Abstract Layered PASS
This work is a re-investigation of the concept and developed tools for the modeling approach called, Abstract Layered PASS (ALPS). The paper... -
Adaptive user interface based on accessibility context
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to...
-
Recent progress of layered memristors based on two-dimensional MoS2
Memristors are memory-capable electronic components that consist of two terminals and a switching layer, whose resistance can be adjusted by an...
-
Sensing Layer—Layered Architecture for Efficient Operation of Intelligent Power System
Power systems today are smart and intelligent in that they are responding fast to the deviations from normal operations and dynamically adjusting the... -
Auditing large language models: a three-layered approach
Large language models (LLMs) represent a major advance in artificial intelligence (AI) research. However, the widespread use of LLMs is also coupled...
-
Three-dimensional phase field feature of longitudinal hydraulic fracture propagation in naturally layered rocks under stress boundaries
Hydraulic fracturing (HF) has been widely used in the exploitation of oil, shale gas and other resources in recent years, while phase field model...
-
Improving the Efficiency of WebRTC Layered Simulcast Using Software Defined Networking
This study proposes a conference bridge that cooperates with both the WebRTC layered simulcast and the Software Defined Networking architecture in... -
A parallel interface tracking approach for evolving geometry problems
This paper presents a parallel interface tracking approach for evolving geometry problems where both the computational domain and mesh are updated as...
-
A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture
Distributed denial-of-service (DDoS) attacks have grown to be a major concern for businesses and individuals who use the internet for operations and...
-
VPI: Vehicle Programming Interface for Vehicle Computing
The emergence of software-defined vehicles (SDVs), combined with autonomous driving technologies, has enabled a new era of vehicle computing (VC),...
-
Dynamic User Interface Composition
With continuous innovation and a persistent attempt to achieve natural human–machine interactions, user interfaces have evolved into the current...
-
Human attention detection system using deep learning and brain–computer interface
Brain–Computer Interface is tested as a successful method in improving human cognitive functions such as attention and memory. Attention plays a...
-
Effect of the Interface Roughness on the Elastic Moduli
In this paper, we study the effect of the interface roughness on the elastic parameters of layered media. We consider the three-dimensional models of... -
European Digital Sovereignty: A Layered Approach
The paper uses a stack model to come to an estimation of the EU's digital capacities on the global stage. Digital capacities are hard to measure and...
-
Layered Audio Descriptions for Videos
The increasing availability of online video content, partially fueled by the Covid-19 pandemic and the growing presence of social media, adds to the... -
LC-PBFT: Layered cross-chain consensus algorithm based on forest topology
As the core of blockchain technology, the consensus mechanism ensures the safe and stable operation of the blockchain system. According to the more...