Showing 1,881 - 1,900 results of 4,865 for search '"privateering"', query time: 0.06s Refine Results
  1. 1881

    Location privacy preserving scheme against attack from friends in SNS by Xi LIN, Yi-liang HAN, Yan KE, Xiao-yuan YANG

    Published 2016-10-01
    “…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
    Get full text
    Article
  2. 1882

    Adaptive selection method of differential privacy GAN gradient clipping thresholds by Peng GUO, Shangping ZHONG, Kaizhi CHEN, Hang CHENG

    Published 2018-05-01
    “…A method of adaptive selection of differential privacy GAN gradient clipping threshold was proposed.The method assumes that a small portion of public data that is identically distributed with the private data can be accessed,a batch of data is randomly selected from the public data,a clipping threshold is set as an average gradient norm of the batch of data,and the above operations are iterated until the network converges.The method was verified on the Mnist and Cifar10 data sets.The results show that under a reasonable privacy budget,the accuracy of CNN classifiers is improved by 1%~4% compared with the differential privacy auxiliary classifier GAN,inception scores increased by 0.6~1.2.…”
    Get full text
    Article
  3. 1883

    Analyse du tutorat d’un collectif d’élèves en podologie en école d’application by François-Marie Pelé, Grégory Munoz, Pierre Parage

    Published 2021-11-01
    “…We present the analysis of the activity of two tutors accompanying simultaneously the learning during the care activity of several learners within a Podology-Pedicuria training institute's application school which welcomes patients in "foot clinic" as well as in private practice. How do the tutors proceed to articulate care activity and learning activity, or according to professional didactics (Pastré, 2011) productive activity and constructive activity? …”
    Get full text
    Article
  4. 1884

    Natures urbaines by Yves Monnier

    Published 2012-09-01
    “…Even though Trenelle cultivates generally useful plants in their “Creole gardens” and La Mouzaïa gardens are construted for enjoyment. They both have a private quality and an amateurish practicality that differentiates them from parks, squares and other institutional green zones. …”
    Get full text
    Article
  5. 1885

    Les agglomérations / vici / castra du Centre-Est de la Gaule : morphologie et fonctions (iiie-viie s. apr. J.-C.) by Michel Kasprzyk

    Published 2017-12-01
    “…The evolution of the urban topography, public buildings and private architecture is discussed, as well as the nature of economic activities and the eventual place of the public power between the 3rd and 7th c. …”
    Get full text
    Article
  6. 1886

    IPv6+ based intelligent IP network solution by Chenxi WANG, Rui GU, Yaqun XIAO, Weibo WANG, Xiaofei WANG, Yue LIU

    Published 2020-08-01
    “…With the advent of the fourth industrial revolution,human society is gradually marching towards the fully connected,intelligent era.The intelligent era needs more automated and intelligent IP network,and the IPv6+ technology family represented by SRv6/BIERv6 is the key foundation for enabling a new generation of IP networks.The technical connotation of IPv6+ was comprehensively described,Huawei's innovation and thinking on IPv6+ solutions were relied on,key technologies and typical applications of IPv6+ in multiple solution scenarios such as simplified connection,SLA guarantee,private network experience,quality perception,and cloud-network integration,helping 5G and cloud business development were introduced.…”
    Get full text
    Article
  7. 1887

    New signcryption algorithm for secure communication of ad hoc networks by ZHANG Chuan-rong1, ZHANG Yu-qing1, LI Fa-gen3, XIAO Hong2

    Published 2010-01-01
    “…Finally, for showing the ap- plication methods and significance of new identity based signcryption algorithm in ad hoc networks, a share refreshing protocol of a serve node’s system private key in threshold key management of ad hoc networks is given.…”
    Get full text
    Article
  8. 1888

    Security analysis and improvement of strongly secure certificate less signature scheme by Ai-wan FAN, Zhao-feng YANG, Li-ming XIE

    Published 2014-05-01
    “…Aiming at this problem, the behavior of KGC was restrained by the change of traditional certificateless algorithm sequence KGC bulletin board where user public key make public, and verifiability of facticity of public key through the local private keys and public keys. The analysis of security shows that the improved scheme cannot only resist the public key replace-ment attack based on dishonest KGC, but also be more efficient than the existing schemes for avoiding pairings and in-verse operation.…”
    Get full text
    Article
  9. 1889

    Spiriti e riti ebraici a Meknes. Seduti alla “tavola di David” by Silvia Bruni

    Published 2020-06-01
    “…The possession by Jewish spirits, evoked only in the domestic sphere and strictly private, is an important arena to explore the relationship between ritual and the daily life of the possessed. …”
    Get full text
    Article
  10. 1890

    A Guide to Living with Wild Cats by Venetia S. Briggs, Rebecca G. Harvey, Frank J. Mazzotti, William M. Giuliano

    Published 2011-12-01
    “…In Belize, the Lamanai Field Research Center and University of Florida are studying cats using camera traps placed in a variety of locations on private lands. This research suggests that more wild cats live near farms than people are aware of. …”
    Get full text
    Article
  11. 1891

    Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT by Jie ZHAO, Huarong ZHANG

    Published 2016-06-01
    “…For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.…”
    Get full text
    Article
  12. 1892

    L’utilisation des nouvelles technologies au service de l’histoire des femmes et du genre. À propos du projet de base de données Eurykleia by Nathalie Ernoult, Letticia Leite, Camille Noûs

    Published 2021-03-01
    “…This database offers the scientific community an overall view of women’s private and public lives in Greek and Roman cities, and provides a strong statistical tool for women and gender studies, devoid of historiographical a priori.…”
    Get full text
    Article
  13. 1893

    La politique de revitalisation de la langue basque dans la communauté autonome basque by Eguzki Urteaga

    Published 2024-01-01
    “…This article focuses on the policy of revitalization of the Basque language developed and then implemented by the Basque Government, in collaboration with public institutions and private entities, in the Basque Autonomous Community located in the Iberian Peninsula. …”
    Get full text
    Article
  14. 1894

    Souffleurs de verre, mémoires intimes « au travail »  by Marie-Ange Lasmènes

    Published 2011-12-01
    “…Finally, far from a search of a historical truth of past, some elements of private memories at work, in a glass firm, hidden by the change of an entrepreneurial context and the assimilation of an official memory, will be presented.…”
    Get full text
    Article
  15. 1895

    Support of the Internet of things for energy transformation by Yusheng XUE, Hongbo ZHU, Qin WANG, Haitao ZHAO

    Published 2019-03-01
    “…The trend of energy transformation is to integrate smart grid into comprehensive energy.The research method is to establish the framework of energy information,physics and social system research.The active support of power transformation is the guarantee of the success of energy transformation.The proposed scheme emphasized the importance of social factors in practical engineering and research.As a new research methodology,it was compatible with mixed simulation of data,model and behavior.The widely used method in engineering was extended to economics and sociology,and the decision-making method based on subjective experience was made more scientific.In addition,in the definition of the Internet of things,the idea of removing the limitations of the Internet was proposed,and a unified framework was used to reflect the impact of the combination of the Internet/private network and other technologies.…”
    Get full text
    Article
  16. 1896

    A Virtual Learning Object (VLO) to Promote Reading Strategies in an English for Specific Purposes Environment by Sandra Cecilia Hernández Urrego

    Published 2019-07-01
    “… This study describes the influence of a Virtual Learning Object in the promotion of reading strategies in a class of English for Specific Purposes for the majors of Social Communication and Journalism at a private institution of higher education in Bogota, Colombia. …”
    Get full text
    Article
  17. 1897

    La diffusion des rickshaws au Tchad, une réponse « par le bas » aux besoins de mobilité des populations urbaines ? by Ronan Mugelé, N'Dilbé Tob-Ro

    Published 2022-12-01
    “…To address these challenges, the private and informal sector appears as a reliable partner. …”
    Get full text
    Article
  18. 1898

    A Guide to Living with Wild Cats by Venetia S. Briggs, Rebecca G. Harvey, Frank J. Mazzotti, William M. Giuliano

    Published 2011-12-01
    “…In Belize, the Lamanai Field Research Center and University of Florida are studying cats using camera traps placed in a variety of locations on private lands. This research suggests that more wild cats live near farms than people are aware of. …”
    Get full text
    Article
  19. 1899

    Pesticide Applicator Certification and Training by Frederick M. Fishel

    Published 2013-10-01
    “…In Florida, UF/IFAS Extension primarily conducts pesticide training, but other associations, industry, non-profit organizations, private companies, and federal and state government agencies also provide and assist with training. …”
    Get full text
    Article
  20. 1900

    Exploring the Adoption of Digital Transformation in Supreme Audit Institutions: A Comprehensive Literature Review by Fatiha NOUAJE, Lotfi BENAZZOU

    Published 2025-02-01
    “…Following the example of private sector auditing, external public auditing, particularly that carried out by the Supreme Audit Institutions (SAIs), is governed by a set of standards that provide a framework for its practices. …”
    Get full text
    Article