Zobrazeno 1 - 10
of 1 034
pro vyhledávání: '"Checksum"'
Autor:
Ping Zhang
Publikováno v:
Mathematics, Vol 12, Iss 7, p 1011 (2024)
COPA, introduced by Andreeva et al., is the first online authenticated encryption (AE) mode with nonce-misuse resistance, and it is covered in COLM, which is one of the final CAESAR portfolios. However, COPA has been proven to be insecure in the rele
Externí odkaz:
https://doaj.org/article/bec041de54544382946054b5d145ff2a
Autor:
Ammar Osamah Hoori
Publikováno v:
Journal of Engineering, Vol 19, Iss 08 (2023)
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error
Externí odkaz:
https://doaj.org/article/cec5a87d38594e2091edd1372c675784
Publikováno v:
IEEE Access, Vol 10, Pp 23931-23947 (2022)
In this paper, we propose a new approach to perform multiple error correction in wireless communications over error-prone networks. It is based on the cyclic redundancy check syndrome, using an optimized lookup table that avoids performing arithmetic
Externí odkaz:
https://doaj.org/article/f6bdae32937840b9b3eb97d18ca1cc6f
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kolev, Orlin
Publikováno v:
Индустриални отношения и обществено развитие / Industrial Relations and Public Development. (4):1-8
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1003077
Publikováno v:
IEEE Access, Vol 9, Pp 66707-66722 (2021)
The relational database has become one of the mainstream tools for data storage and management. However, there are two main types of threats to relational databases: external attacks and internal tampering threats. In this paper, we focus on the inte
Externí odkaz:
https://doaj.org/article/2a27b5695800452fbd043170acfe439d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2546-2558
The ability of Convolutional Neural Networks (CNNs) to accurately process real-time telemetry has boosted their use in safety-critical and high-performance computing systems. As such systems require high levels of resilience to errors, CNNs must exec
Autor:
PERNE, MARTIN
Izračun internetne vsote je pogosto izvedena operacija, do katere pride med pošiljanjem paketov po omrežni povezavi. V diplomski nalogi obravnavamo učinkovit izračun internetne vsote. Internetno vsoto in njene lastnosti opišemo, nato pregledamo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3505::d66261be5d94a3a7d182e963f9eec1bc
https://repozitorij.uni-lj.si/IzpisGradiva.php?id=143988
https://repozitorij.uni-lj.si/IzpisGradiva.php?id=143988
Publikováno v:
Materials Today: Proceedings. 60:1329-1333
A distributed computing platform is preferred to meet out the current challenges of cloud computing paradigm. Hadoop manages distribution of large volume of big data and data is stored using cluster analysis of data. Hadoop Distributed File System (H