Showing 2,641 - 2,660 results of 6,432 for search '"memory"', query time: 0.06s Refine Results
  1. 2641

    Single password authentication method for remote user based on mobile terminal assistance by Yuan XU, Chao YANG, Li YANG

    Published 2019-02-01
    “…To address the issue that users frequently reuse their weak passwords in password-based authentication system,single password authentication based on secret sharing between server and mobile terminal (SPASS) was proposed,which allows a remote user to use a single password to authenticate to multiple services securely and has no need to store any secret of the user in the client PC.Even when the mobile device is lost or stolen,no damage to the user’s information will be induced.Security analysis and performance test show that SPASS greatly improves the security of the user’s secret information and resists dictionary attacks,honeypot attacks,cross-site scripting attacks etc.Furthermore,the proposed scheme can lighten burden of the user’s memory,reduce the storage pressure and easy to be deployed.…”
    Get full text
    Article
  2. 2642

    T-Cell Traffic Jam in Hodgkin's Lymphoma: Pathogenetic and Therapeutic Implications by Claudio Fozza, Maurizio Longinotti

    Published 2011-01-01
    “…This is particularly true in Hodgkin's lymphoma (HL), in which T lymphocytes surrounding Hodgkin's Reed-Sternberg cells are essentially polarized towards a memory T-helper type 2 phenotype. In this paper we will first evaluate the main processes modulating T-cell recruitment towards the lymph node microenvironment in HL, especially focusing on the role played by cytokines. …”
    Get full text
    Article
  3. 2643

    Hippocampal Neurogenesis, Depressive Disorders, and Antidepressant Therapy by Eleni Paizanis, Michel Hamon, Laurence Lanfumey

    Published 2007-01-01
    “…Neurogenesis is involved in processes such as learning and memory and accumulating evidence implicates hippocampal neurogenesis in the physiopathology of depression. …”
    Get full text
    Article
  4. 2644

    Cardinality-constrained structured data-fitting problems by Fan, Zhenan, Fang, Huang, Friedlander, Michael P.

    Published 2024-05-01
    “…A memory-efficient solution framework is proposed for the cardinality-constrained structured data-fitting problem. …”
    Get full text
    Article
  5. 2645

    Automated intrusion response system model based on danger theory by Ling-xi PENG, Dong-qing XIE, Ying-fang FU, Wei XIONG, Yu-li SHEN

    Published 2012-01-01
    “…A novel automated response system model based on the danger theory (AIRSDT) was given.With the descriptions of self,non-self,immunocyte,memory detector,mature detector and immature detector of the network transactions,network danger evaluation equations for host and network were built up.Then,the automated response actions were taken or adjusted according to the danger of each network attack,including holistic risk degrees of the host and network.Both the theory analysis and experimental results prove that AIRSDT not only helps to solve the problem that the current automated response models could not detect the ‘true’ intrusion or attack action,but also greatly reduces the response times and response cost.…”
    Get full text
    Article
  6. 2646

    Electronic and Optical Properties of Sodium Niobate: A Density Functional Theory Study by Daniel Fritsch

    Published 2018-01-01
    “…In recent years, much effort has been devoted to replace the most commonly used piezoelectric ceramic lead zirconate titanate Pb[ZrxTi1−x]O3 (PZT) with a suitable lead-free alternative for memory or piezoelectric applications. One possible alternative to PZT is sodium niobate as it exhibits electrical and mechanical properties that make it an interesting material for technological applications. …”
    Get full text
    Article
  7. 2647

    A New Framework of Multiphase Segmentation and Its Application to Partial Volume Segmentation by Fuhua Chen, Yunmei Chen, Hemant D. Tagare

    Published 2011-01-01
    “…In this way, it saves memory space and also avoids the general simplex constraint problem for soft segmentations. …”
    Get full text
    Article
  8. 2648

    « Never Meet Your Heroes ». Généalogie cinématographique et matrice science-fictionnelle dans The Boys by Thomas Carrier-Lafleur, Baptiste Creps

    Published 2022-06-01
    “…Similarly, the authors will show how the use of the science- fictional imaginary, notably through the use of the film-matrix Scanners (David Cronenberg, 1981), composes a clear genealogical source while, at the same time, The Boys renews its relationship to cinephilic memory and to media and political criticism in a formal synthesis of New Hollywood.…”
    Get full text
    Article
  9. 2649

    Les « règlements intérieurs » de village en Kabylie : entre maintien d’un droit coutumier et dynamiques nouvelles des communautés villageoises by Malika Assam

    Published 2017-06-01
    “…But they also include many explanations showing the work of reflexivity led by stakeholders who rely on old principles such as the importance of the village personality, but also integrate modern references to politics, identity and memory.…”
    Get full text
    Article
  10. 2650

    FORMATION OF METHODICAL BASE IN THE COST-NAVIGATION SYSTEM by L. Zelentsova, Y. Vorontsova

    Published 2017-01-01
    “…For descriptive reasons authors offer use of the hybrid analytical cards comprising various technologies and providing a possibility of symbiosis of traditional systems of the business analysis and the new approaches providing a possibility of high-performance work with continuously growing volumes of data, keeping them in random access memory.…”
    Get full text
    Article
  11. 2651

    Les Archives de la planète, entre ressource documentaire et matière à récits by Valérie Perlès

    Published 2022-03-01
    “…This article shows to what extent the heterogeneous character of the initial aims are found in current uses of the archives, between a simple documentary reservoir on the world at that time, a scientific contextualisation project, and appropriations by memory and art.…”
    Get full text
    Article
  12. 2652

    “Nothing could stop it, nothing”: The Burden of Postsouthern History in Barry Hannah’s “Uncle High Lonesome” by Clare Chadd

    Published 2018-07-01
    “…This paper argues for Hannah’s unique currency in ongoing critical debates, both in the new southern studies and in southern literary studies more broadly, about the future of “South” and the concept of inherited historical memory in a post-regional and post-historical culture. …”
    Get full text
    Article
  13. 2653

    De la petite chanson aux rafales du vent : le parcours de la ritournelle dans l’œuvre poétique d’Emily Brontë by Charlotte Borie

    Published 2010-06-01
    “…The incantatory resurgence of the ritornello punctuates the poetic mind’s trip from fancy to imagination, along which the idea of return applies less to the memory than to the repressed.…”
    Get full text
    Article
  14. 2654

    Le poids de l’instant dans le récit ferroviaire contemporain by Mahigan Lepage

    Published 2015-06-01
    “…The instant thus takes on the weight of time, maybe even of memory.…”
    Get full text
    Article
  15. 2655

    The State, the Museum and the Ethnographer in Constructing National Heritage: Defining Estonian National Costumes in the 1930s by Marleen Nõmmela

    Published 2011-03-01
    “…The Estonian National Museum (ENM) as a repository of memory and knowledge availed its resources to support cultural propaganda. …”
    Get full text
    Article
  16. 2656

    Past deformations of "Brezhnevian stagnation" in Lithuanian cinema and TV fiction films (1968-1980) by Lina Kaminskaitė-Jančorienė

    Published 2008-12-01
    “… The objective of this work is to identify collective memory shapes in Lithuanian fiction TV and cinema film during the Brezhnevian period (1968-1980). …”
    Get full text
    Article
  17. 2657

    Comparative study of power analysis attacks based on template and KNN algorithm by Jifang JIN, Chengyuan LIU, Xiaohong FAN, Xiaoyi DUAN, Jiayu LIU

    Published 2022-04-01
    “…Power analysis attack is still the most threatening type of side channel attack on cryptographic hardware.The template analysis attack with the attack of KNN algorithm was compared.Firstly, three dimensionality reduction methods of Pearson correlation coefficient, mutual information and maximum information coefficient and distance correlation coefficient were studied.Then, the effects of the number of feature points on the attack success rate of the two power analysis attacks under the same number of power consumption curves were compared.At the same time, the effects of different dimensionality reduction techniques on the two power analysis attacks when the number of power curves is the same and different.The results show that the template attack is better than the KNN algorithm attack in running speed, memory occupation and robustness, and the KNN algorithm attack has better performance in attack success rate.…”
    Get full text
    Article
  18. 2658

    Two-level cache based streaming media scheduling algorithm for mobile network by LIAO Jian-xin, YANG Bo, ZHU Xiao-min, WANG Chun

    Published 2007-01-01
    “…A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA(two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS(two-level cache based mobile streaming scheduling) was designed;mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.…”
    Get full text
    Article
  19. 2659

    Immunotherapeutic Strategies for Alzheimer's Disease Treatment by Beka Solomon

    Published 2009-01-01
    “…Moreover, these antibodies protected the mice from learning and age-related memory deficits. Active and/or passive immunization against the amyloid-β peptide has been proposed as a method for preventing and/or treating AD. …”
    Get full text
    Article
  20. 2660

    Daily Precipitation Prediction Based on SVM-CEEMDAN-BiLSTM Model by LING Ming, XIAO Liying, ZHAO Jia, WANG Pinggen, WANG Yin, XIANG Kai, CAI Gaotang

    Published 2023-01-01
    “…In order to solve the problem of low prediction accuracy of the maximum value and rain-free days in daily precipitation series,a coupled model of precipitation prediction based on a support vector machine (SVM),complete ensemble empirical modal decomposition (CEEMDAN),and bi-directional long and short-term memory neural network (BiLSTM) was proposed. This paper applied the coupled model to predict the daily precipitation at Jingdezhen Station and Ganxian Station in the Poyang Lake Basin, and the results were compared with those of traditional model combinations. …”
    Get full text
    Article