Results 271 to 280 of about 1,968,102 (329)
A Combinatorial Approach to Synthetic Data Generation for Machine Learning. [PDF]
Khadka K +4 more
europepmc +1 more source
Virtual Constitutions: The Creation of Rules for Governing Private Networks
Michael I. Meyerson
openalex +1 more source
Guanxi capitalism in China : the role of private enterprises and networks for economic development
Susanne Rühle
openalex +1 more source
Treatment Modifications After Drug Shortages Among Primary Care Physicians.
Jarrett JB, Dillane KE, Hollett G.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy, 2011Social Networking Sites (SNSs) are having a significant impact on the social life of many people - even beyond the millions of people that use them directly. These websites usually allow users to present a profile of themselves through a long list of very detailed information. However, even when such SNSs have advanced privacy policies, users are often
CONTI, MAURO, Hasani A, Crispo B.
openaire +5 more sources
IEEE Potentials, 2001
A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links.
Lance Pickett, Kathy S. Lassila
openaire +2 more sources
A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links.
Lance Pickett, Kathy S. Lassila
openaire +2 more sources
BT Technology Journal, 2000
Existing technologies, including frame relay and ATM, can be used to create virtual private networks (VPNs) over a shared infrastructure. However, two new technologies, tag switching and IP security, may be used to create IP VPNs that are independent of the access network and the core technology. This paper examines these technologies, compares them to
S Hills, D McGlaughlin, N Hanafi
openaire +1 more source
Existing technologies, including frame relay and ATM, can be used to create virtual private networks (VPNs) over a shared infrastructure. However, two new technologies, tag switching and IP security, may be used to create IP VPNs that are independent of the access network and the core technology. This paper examines these technologies, compares them to
S Hills, D McGlaughlin, N Hanafi
openaire +1 more source

