Results 81 to 90 of about 275,015 (197)
Prevention of Unauthorized Software Execution: Identification of Applications
In this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.
E. Y. Rodionov, M. V. Senik
doaj
Credibility of an education program accreditor is dependent on consistency in decision-making among program reviews. The use of peer-review accreditation survey teams is a potential source of inconsistency in the review of individual programs, especially
Robert Hash
doaj
Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms
The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses.
Arif Indra Irawan +3 more
doaj +1 more source
Network traffic analysis system based on IPFIX
To deal with the large-scale traffic capture and management in high speed network,the performance of IPFIX system was studied.An optimized architecture was proposed and implemented based on improved binary information integration to collect data and ...
Yun-long MA, Qian-li ZHANG, Ji-long WANG
doaj
Hash & Adjust: Competitive Demand-Aware Consistent Hashing
This paper has been accepted to International Conference on Principles of Distributed Systems (OPODIS 2024)
Pourdamghani, Arash +4 more
openaire +4 more sources
The Role of Accreditation in Supporting Educational Quality During Difficult Circumstances
Accreditation aims to ensure that generally-accepted standards of educational program quality are being met. The Liaison Committee on Medical Education (LCME), the accrediting body for medical education programs leading to the MD degree, has a process ...
Barbara Barzansky, Robert Hash
doaj
Digestibility, Passage Rate, Growth, and Digesta Properties in Windsnyer Pigs Fed Increasing Potato Hash Silage. [PDF]
Ncobela CN, Kanengoni AT, Chimonyo M.
europepmc +1 more source
High-Throughput and Memory-Efficient Pipeline Key-Value Store Architecture on FPGA. [PDF]
Wang X, Liu L, Li Y.
europepmc +1 more source
A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source

