Results 1 to 10 of about 172,963 (284)

On the Upload versus Download Cost for Secure and Private Matrix Multiplication [PDF]

open access: greenInformation Theory Workshop, 2019
In this paper, we study the problem of secure and private distributed matrix multiplication. Specifically, we focus on a scenario where a user wants to compute the product of a confidential matrix A, with a matrix $B_{\theta}$, where $\theta \in$ {1 ...
Wei-Ting Chang, Ravi Tandon
openalex   +3 more sources

An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload

open access: diamond, 2016
The development of computer security technology is very rapidly. Web security is one of the areas that require particular attention related to the abundance of digital crimes conducted over the web.
Imam Riadi, Eddy Irawan Aristianto
openalex   +2 more sources

The dark path to eternal life: Machiavellianism predicts approval of mind upload technology

open access: hybridPersonality and Individual Differences, 2021
Michael Laakasuo   +9 more
openalex   +2 more sources

DEVELOPMENT OF SOFTWARE TO AUTOMATE THE PREPARATION OF THE CLIENT BASE FOR THE FORMATION OF THE EXECUTION ENVIRONMENT UPDATE

open access: yesInternational Journal of Advanced Studies, 2023
The development of software products for process automation is becoming more and more in demand. One of the main directions is the creation of software to automate the preparation of the client base to form the execution environment update, which allows ...
Marat R. Khamidullin   +4 more
doaj   +1 more source

DEVELOPMENT OF SOFTWARE FOR THE GROUP LOCALIZATION OF PHRASES IN THE DATABASE

open access: yesInternational Journal of Advanced Studies, 2023
When creating modern cars, in addition to analog and mechanical devices, digital technologies are also very widely used. The article considers the process of software development for group unloading of text phrases into a database in the C# programming
Gulnara A. Gareeva   +3 more
doaj   +1 more source

Analyzing Troubleshooting of BTS Transmit Power and 4G LTE Coverage Area via VSWR Value Measurement

open access: yesAndalas Journal of Electrical and Electronic Engineering Technology, 2023
The Voltage Standing Wave Ratio (VSWR) serves as a comparative measure between transmitter and receiver voltages, impacting site transmit power. VSWR values at a Radio Base Station (RBS) are evident in feeder cable losses, jumpers, combiners, and radio ...
Nadila Khairanisa   +3 more
doaj   +1 more source

The incidence of unexpected delays in uploading outside radiologic images in the transfer of patients with major trauma [PDF]

open access: yesJournal of Trauma and Injury, 2022
Purpose Critically ill patients are frequently transferred from one point of care to a hospital that can provide a higher level of care. To achieve optimal treatment within the targeted window of time necessary for time-sensitive cases like major trauma,
Si Jun Woo, Yong Oh Kim, Hyung Il Kim
doaj   +1 more source

Teknik Tes File Upload dan Multiple Choice di Google Form dalam Pembelajaran Membaca Teks Eksposisi

open access: yesJurnal Pembelajaran Bahasa dan Sastra, 2023
Penelitian ini bertujuan untuk mendeskripsikan: 1) keterampilan membaca teks eksposisi melalui pembelajaran yang menggunakan teknik tes opsi file upload di google form berbasis artikel ilmiah jurnal online; 2) keterampilan membaca teks eksposisi melalui ...
Bella Karisma
semanticscholar   +1 more source

Rehearsing Upload

open access: yesSound Stage Screen, 2023
This article examines the process of developing a posthuman opera, Michel van der Aa’s Upload (2021), from the perspective of a rehearsal ethnography.
Lea Luka Sikau
doaj   +1 more source

UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis

open access: yesInternational Symposium on Recent Advances in Intrusion Detection, 2021
Unrestricted file upload vulnerabilities enable attackers to upload malicious scripts to a web server for later execution. We have built a system, namely UFuzzer, to effectively and automatically detect such vulnerabilities in PHP-based server-side web ...
Jin Huang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy