Academic literature on the topic 'Hierarchical schemes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hierarchical schemes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hierarchical schemes"

1

Si, Jing Jing. "A Hierarchical Multicast Scheme for Heterogeneous Receivers." Advanced Materials Research 108-111 (May 2010): 57–62. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.57.

Full text
Abstract:
We investigate inter-session network coding for networks with heterogeneous receivers in this paper. Based on layered source coding, we define the hierarchical inter-layer random network codes, and propose a hierarchical multicast scheme. Moreover, we compare our hierarchical multicast scheme with the layered multicast schemes in theory and with simulations. Simulation results show that our hierarchical multicast scheme can achieve the optimal aggregate throughput for some networks where the layered multicast schemes are suboptimal.
APA, Harvard, Vancouver, ISO, and other styles
2

Alam, Irfan, Amal S. Alali, Shakir Ali, and Muhammad S. M. Asri. "A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure." Axioms 13, no. 8 (2024): 515. http://dx.doi.org/10.3390/axioms13080515.

Full text
Abstract:
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir’s scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the num
APA, Harvard, Vancouver, ISO, and other styles
3

Qihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen, and Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption." 網際網路技術學刊 23, no. 6 (2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.

Full text
Abstract:
<p>By dividing encryption as online and offline stages, the online/offline encryption schemes are very suitable to lightweight equipment. For the offline stage, high-performance equipment is used for complex preprocessing calculation, and the online stage the lightweight devices only make some simple calculations. In addition, side channel attacks can disclose some secret information of the cryptosystem, which leads to the destruction of the security of the cryptography schemes. Most of the online/offline identity-based encryption schemes cannot resist side channel attacks. The paper pro
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Lin Lin, Chun An You, Jian Xin Liu, and Qiu Yuan Liu. "Research on Treatment Scheme Optimization for Slope Based on Analytic Hierarchy Process." Applied Mechanics and Materials 90-93 (September 2011): 402–5. http://dx.doi.org/10.4028/www.scientific.net/amm.90-93.402.

Full text
Abstract:
At present, there are numerous treatment schemes for slope, while there is a lack of research on scheme evaluation and optimization. According to analytic hierarchy process, this paper takes two treatment schemes for Cangshang pit slope as research object, which are reducing load by cutting slope and strengthening by grouting, handles the complicated problem hierarchically and systematically, and establishes hierarchical structure model. Judgment matrixes are constructed to analyze multiple factors synthetically, which combine qualitative analysis and quantitative analysis preferably, and opti
APA, Harvard, Vancouver, ISO, and other styles
5

TOCHIKUBO, Kouya. "General Secret Sharing Schemes Using Hierarchical Threshold Scheme." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 9 (2019): 1037–47. http://dx.doi.org/10.1587/transfun.e102.a.1037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Chien-Ming, Xinying Zheng, and Tsu-Yang Wu. "A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/816549.

Full text
Abstract:
Heterogeneous cluster-based wireless sensor networks (WSN) attracted increasing attention recently. Obviously, the clustering makes the entire networks hierarchical; thus, several kinds of keys are required for hierarchical network topology. However, most existing key management schemes for it place more emphasis on pairwise key management schemes or key predistribution schemes and neglect the property of hierarchy. In this paper, we propose a complete hierarchical key management scheme which only utilizes symmetric cryptographic algorithms and low cost operations for heterogeneous cluster-bas
APA, Harvard, Vancouver, ISO, and other styles
7

Langrehr, Roman, and Jiaxin Pan. "Tightly Secure Hierarchical Identity-Based Encryption." Journal of Cryptology 33, no. 4 (2020): 1787–821. http://dx.doi.org/10.1007/s00145-020-09356-x.

Full text
Abstract:
Abstract We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length. The security reductions of previous HIBEs lose at least a factor of Q, which is the number of user secret key queries. Different to that, the security loss of our schemes is only dependent on the security parameter. Our schemes are adaptively secu
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Miqi, Lin You, Gengran Hu, Liang Li, and Chengtang Cao. "A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture." Security and Communication Networks 2021 (April 22, 2021): 1–20. http://dx.doi.org/10.1155/2021/5592119.

Full text
Abstract:
In a multiserver architecture, authentication schemes play an important role in the secure communication of the system. In many multiserver authentication schemes, the security of the mutual authentications among the participants is based on the security of the registration center’s private key. This centralized architecture can create security risks due to the leakage of the registration center’s private key. Blockchain technology, with its decentralized, tamper-proof, and distributed features, can provide a new solution for multiserver authentication schemes. In a lot of multiserver authenti
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Nan Nan, and Jian Bo Yao. "Hybrid Key Management Scheme for WSN." Applied Mechanics and Materials 513-517 (February 2014): 424–30. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.424.

Full text
Abstract:
Wireless sensor networks are widely applied in various applications. But due to the resource-constrained sensor nodes and the malicious attacks, the traditional key management schemes are not suitable for the network. Contraposing the particularities, many relevant key management schemes are developed for WSNs the network. Based on the framework of WSNs, existing schemes can be classified into two categories: flat distributed architecture and hierarchical architecture. In this paper, a hybrid key management scheme for wireless sensor network is proposed by combining the distributed architectur
APA, Harvard, Vancouver, ISO, and other styles
10

Tian, Qiuting, Dezhi Han, and Yanmei Jiang. "Hierarchical authority based weighted attribute encryption scheme." Computer Science and Information Systems 16, no. 3 (2019): 797–813. http://dx.doi.org/10.2298/csis180912027t.

Full text
Abstract:
With the development of cloud storage technology, data storage security has become increasingly serious. Aiming at the problem that existing attribute-based encryption schemes do not consider hierarchical authorities and the weight of attribute. A hierarchical authority based weighted attribute encryption scheme is proposed. This scheme will introduce hierarchical authorities and the weight of attribute into the encryption scheme, so that the authorities have a hierarchical relationship and different attributes have different importance. At the same time, the introduction of the concept of wei
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hierarchical schemes"

1

MURALIDHAR, KURUDI HANUMANTHARAO. "HIERARCHICAL SCHEMES FOR ROUTING AND FLOW CONTROL IN COMMUNICATION NETWORKS." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187913.

Full text
Abstract:
This dissertation describes three different hierarchical schemes for routing and flow control in communication networks. The basic idea in these schemes is to distribute the decision making capability among different hierarchical levels. A part of the decision is made at the lower level of network nodes and another part is made at the higher level of Coordinators. Specific problems at the lower level of nodes and the higher level of Coordinators are formulated in an optimization framework and solutions to these problems result in the overall control scheme. Two modes of operation for the Coord
APA, Harvard, Vancouver, ISO, and other styles
2

Castiglione, Arcangelo. "New Insights on cryptographic hierarchical access control: models, schemes and analysis." Doctoral thesis, Universita degli studi di Salerno, 2016. http://hdl.handle.net/10556/2489.

Full text
Abstract:
2014 - 2015<br>Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which en- sures that only authorized users are given access to certain resources or tasks. In particular, according to their respective roles and respon- sibilities, users are typically organized into hierarchies composed of several disjoint classes (security classes). A hierarchy is characterized by the fact that some users may have more access rights than others, according to a top-down inclusion paradigm following speci c hier- archical depen
APA, Harvard, Vancouver, ISO, and other styles
3

Giang, Truong Minh Triet, and trietgiang@yahoo com. "Efficient Admission Control Schemes in Cellular IP Networks." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20060829.113000.

Full text
Abstract:
The thesis reviews current admission control schemes in cellular IP networks. It proposes an improved version of Threshold Access Sharing and a new scheme: weight-based scheme. Finally, an admission control scheme for hierarchical cellular network is introduced.
APA, Harvard, Vancouver, ISO, and other styles
4

Fidelman, Emily S. "Metadata Quality and the Use of Hierarchical Schemes to Determine Meta Keywords: An Exploration." Thesis, School of Information and Library Science, 2006. http://hdl.handle.net/1901/288.

Full text
Abstract:
This study explores the impact of vocabulary scheme arrangement on the quality of author-generated metadata, specifically specificity and frequency of vocabulary terms chosen from schemes to describe websites. By evaluating vocabulary assigned using hierarchical and flat schemes, and by comparing these evaluations, this study seeks to isolate the arrangement of the scheme used from other variables, such as skill level and intentions of metadata generators, which have been the focus of previous research into the viability of author-generated metadata. This study suggests a relationship betwee
APA, Harvard, Vancouver, ISO, and other styles
5

Alexander, Simon. "Two- and Three-Dimensional Coding Schemes for Wavelet and Fractal-Wavelet Image Compression." Thesis, University of Waterloo, 2001. http://hdl.handle.net/10012/1180.

Full text
Abstract:
This thesis presents two novel coding schemes and applications to both two- and three-dimensional image compression. Image compression can be viewed as methods of functional approximation under a constraint on the amount of information allowable in specifying the approximation. Two methods of approximating functions are discussed: Iterated function systems (IFS) and wavelet-based approximations. IFS methods approximate a function by the fixed point of an iterated operator, using consequences of the Banach contraction mapping principle. Natural images under a wavelet basis have char
APA, Harvard, Vancouver, ISO, and other styles
6

Zabanoot, Zaid Ahmed Said. "Modelling and Analysis of Resource Management Schemes in Wireless Networks. Analytical Models and Performance Evaluation of Handoff Schemes and Resource Re-Allocation in Homogeneous and Heterogeneous Wireless Cellular Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5383.

Full text
Abstract:
Over recent years, wireless communication systems have been experiencing a dramatic and continuous growth in the number of subscribers, thus placing extra demands on system capacity. At the same time, keeping Quality of Service (QoS) at an acceptable level is a critical concern and a challenge to the wireless network designer. In this sense, performance analysis must be the first step in designing or improving a network. Thus, powerful mathematical tools for analysing most of the performance metrics in the network are required. A good modelling and analysis of the wireless cellular networks wi
APA, Harvard, Vancouver, ISO, and other styles
7

Tomaras, Panagiotis J. "Decomposition of general queueing network models : an investigation into the implementation of hierarchical decomposition schemes of general closed queueing network models using the principle of minimum relative entropy subject to fully decomposable constraints." Thesis, University of Bradford, 1989. http://hdl.handle.net/10454/4212.

Full text
Abstract:
Decomposition methods based on the hierarchical partitioning of the state space of queueing network models offer powerful evaluation tools for the performance analysis of computer systems and communication networks. These methods being conventionally implemented capture the exact solution of separable queueing network models but their credibility differs when applied to general queueing networks. This thesis provides a universal information theoretic framework for the implementation of hierarchical decomposition schemes, based on the principle of minimum relative entropy given fully decomposab
APA, Harvard, Vancouver, ISO, and other styles
8

Spence, James B. "Habitat analysis by hierarchical scheme and stream geomorphology." Huntington, WV : [Marshall University Libraries], 2005. http://www.marshall.edu/etd/descript.asp?ref=555.

Full text
Abstract:
Theses (M.S.)--Marshall University, 2005.<br>Title from document title page. Includes abstract. Document formatted into pages: contains ix, 139 p. including illustrations and map. Bibliography: p. 83-89.
APA, Harvard, Vancouver, ISO, and other styles
9

Bakolas, Efstathios. "A Hierarchical On-Line Path Planning Scheme using Wavelets." Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14489.

Full text
Abstract:
The main objective of this thesis is to present a new path planning scheme for solving the shortest (collision-free) path problem for an agent (vehicle) operating in a partially known environment. We present two novel algorithms to solve the planning problem. For both of these approaches we assume that the agent has detailed knowledge of the environment and the obstacles only in the vicinity of its current position. Far away obstacles or the final destination are only partially known and may even change dynamically at each instant of time. The path planning scheme is based on information gathe
APA, Harvard, Vancouver, ISO, and other styles
10

Jimenez, Carrizosa Miguel. "Hierarchical control scheme for multi-terminal high voltage direct current power networks." Thesis, Paris 11, 2015. http://www.theses.fr/2015PA112039/document.

Full text
Abstract:
Cette thèse traite de la commande hiérarchique de réseaux à courant continu multi-terminaux à haute tension (MT-HVDC) intégrant des sources d'énergie renouvelables à grande échelle. Le schéma de contrôle proposé est composé de quatre ‘couches’ : le contrôle local où se trouvent les convertisseurs de puissance, avec une échelle de temps de l’ordre de la milliseconde ; le contrôle primaire qui est décentralisé et appliqué à plusieurs terminaux avec une échelle du temps de l’ordre de la seconde ; un niveau de commande où la communication est prise en compte et où l’approche de Modèle du Commande
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hierarchical schemes"

1

Farkas, Keith I. A decentralized hierarchical cache-consistency scheme for shared-memory multiprocessors. National Library of Canada = Bibliothèque nationale du Canada, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. National Aeronautics and Space Administration., ed. Parallelized modelling and solution scheme for hierarchically scaled simulations: Final report. National Aeronautics and Space Administration, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leibo, Joel Z., and Tomaso Poggio. Perception. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199674923.003.0025.

Full text
Abstract:
This chapter provides an overview of biological perceptual systems and their underlying computational principles focusing on the sensory sheets of the retina and cochlea and exploring how complex feature detection emerges by combining simple feature detectors in a hierarchical fashion. We also explore how the microcircuits of the neocortex implement such schemes pointing out similarities to progress in the field of machine vision driven deep learning algorithms. We see signs that engineered systems are catching up with the brain. For example, vision-based pedestrian detection systems are now a
APA, Harvard, Vancouver, ISO, and other styles
4

Booij, Geert. Inheritance and motivation in Construction Morphology. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198712329.003.0002.

Full text
Abstract:
The basic question to be addressed in this chapter is: what is the status of the notions ‘inheritance’ and ‘default inheritance’ in the theoretical framework of Construction Morphology (CM)? This framework, developed in Booij (2010), assumes a hierarchical lexicon with both abstract morphological schemas and stored complex words that instantiate these schemas. The lexicon of a language can be modelled in such a way that the abstract word formation schemas dominate their individual instantiations. Thus, the lexicon is partially conceived of as a hierarchical network in which lower nodes, the ex
APA, Harvard, Vancouver, ISO, and other styles
5

Booij, Geert E. Morphology in Construction Grammar. Edited by Thomas Hoffmann and Graeme Trousdale. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780195396683.013.0014.

Full text
Abstract:
This chapter presents a whole range of arguments for a Construction Grammar approach to morphology. It shows that the lexicon contains both (simplex and complex) words and word formation schemas of various degrees of abstraction, and provides evidence supporting the view that morphological construcitons have holistic properties. The chapter considers both word formation and inflectional morphology and discusses the relationship between morphological and syntactic constructions. The findings confirm that the lexicon is to be reinterpreted as the "constructicon," a structured and hierarchically
APA, Harvard, Vancouver, ISO, and other styles
6

Damer, Seán. Scheming. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474440561.001.0001.

Full text
Abstract:
This book seeks to explain how the Corporation of Glasgow, in its large-scale council house-building programme in the inter- and post-war years, came to reproduce a hierarchical Victorian class structure. The three tiers of housing scheme which it constructed – Ordinary, Intermediate, and Slum-Clearance – effectively signified First, Second and Third Class. This came about because the Corporation uncritically reproduced the offensive and patriarchal attitudes of the Victorian bourgeoisie towards the working-class. The book shows how this worked out on the ground in Glasgow, and describes the a
APA, Harvard, Vancouver, ISO, and other styles
7

Corcoran, Andrew W., and Jakob Hohwy. Allostasis, interoception, and the free energy principle: Feeling our way forward. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198811930.003.0015.

Full text
Abstract:
Interoceptive processing is commonly understood in terms of the monitoring and representation of the body’s current physiological (i.e. homeostatic) status, with aversive sensory experiences encoding some impending threat to tissue viability. However, claims that homeostasis fails to fully account for the sophisticated regulatory dynamics observed in complex organisms have led some theorists to incorporate predictive (i.e. allostatic) regulatory mechanisms within broader accounts of interoceptive processing. Critically, these frameworks invoke diverse—and potentially mutually inconsistent—inte
APA, Harvard, Vancouver, ISO, and other styles
8

Heiner, Karl W., Marc Kennedy, and Anthony O'Hagan. Sequential multilocation auditing and the New York food stamps program. Edited by Anthony O'Hagan and Mike West. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780198703174.013.23.

Full text
Abstract:
This article discusses the use of Bayesian methods in analysing data that evolve over time in sequential multilocation auditing. Using the New York food stamps program as a case study, it proposes a model that incorporates a nonparametric component for the error magnitudes (taints), a hierarchical model for overall error rates across counties and parameters controlling the variation of rates from one year to the next, including an overall trend in error rates. The article first provides an overview of the New York food stamps program, along with the auditing concepts and terminology, before in
APA, Harvard, Vancouver, ISO, and other styles
9

Sobczyk, Eugeniusz Jacek. Uciążliwość eksploatacji złóż węgla kamiennego wynikająca z warunków geologicznych i górniczych. Instytut Gospodarki Surowcami Mineralnymi i Energią PAN, 2022. http://dx.doi.org/10.33223/onermin/0222.

Full text
Abstract:
Hard coal mining is characterised by features that pose numerous challenges to its current operations and cause strategic and operational problems in planning its development. The most important of these include the high capital intensity of mining investment projects and the dynamically changing environment in which the sector operates, while the long-term role of the sector is dependent on factors originating at both national and international level. At the same time, the conditions for coal mining are deteriorating, the resources more readily available in active mines are being exhausted, m
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Hierarchical schemes"

1

Batyrshin, Ildar, and Tamas Rudas. "Invariant Hierarchical Clustering Schemes." In Perception-based Data Mining and Decision Making in Economics and Finance. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-36247-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vasquez, Daniel, Rainer Gruhn, and Wolfgang Minker. "Hierarchical Approach and Downsampling Schemes." In Signals and Communication Technology. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-34425-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chin, Ji-Jian, Swee-Huay Heng, and Bok-Min Goi. "Hierarchical Identity-Based Identification Schemes." In Security Technology. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10847-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Farràs, Oriol, and Carles Padró. "Ideal Hierarchical Secret Sharing Schemes." In Theory of Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11799-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferrara, Anna Lisa, Federica Paci, and Chiara Ricciardi. "Verifiable Hierarchical Key Assignment Schemes." In Data and Applications Security and Privacy XXXV. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81242-3_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhatia, Randeep, Rakesh K. Sinha, and Chung-Min Chen. "Hierarchical Declustering Schemes for Range Queries." In Advances in Database Technology — EDBT 2000. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46439-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vergauwen, Philip. "Technological Spillovers and Incentive Schemes for R&D." In Design Models for Hierarchical Organizations. Springer US, 1995. http://dx.doi.org/10.1007/978-1-4615-2285-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ishida, K. "Space-Time Tradeoff in Hierarchical Routing Schemes." In Responsive Computer Systems. Springer Vienna, 1993. http://dx.doi.org/10.1007/978-3-7091-9288-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

De Santis, Alfredo, Anna Lisa Ferrara, and Barbara Masucci. "Efficient Provably-Secure Hierarchical Key Assignment Schemes." In Mathematical Foundations of Computer Science 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74456-6_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vadi, Vikas Rao, Naveen Kumar, and Shafiqul Abidin. "Classifying Time-Bound Hierarchical Key Assignment Schemes." In Advances in Computer, Communication and Computational Sciences. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4409-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hierarchical schemes"

1

Xie, Jian, Zhi Tan, Yueming Lu, and Yuefeng Ji. "A comparative study of restoration schemes and a new hierarchical hybrid restoration scheme in hierarchical networks." In Asia-Pacific Optical Communications, edited by Yong Hyub Won, Gee-Kung Chang, Ken-ichi Sato, and Jian Wu. SPIE, 2006. http://dx.doi.org/10.1117/12.688484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yan Zhang and Boon-Hee Soong. "Take-back schemes in hierarchical cellular systems." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1577348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zurawski, J., and Dajin Wang. "Fault-Tolerance Schemes for Hierarchical Mesh Networks." In Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). IEEE, 2005. http://dx.doi.org/10.1109/pdcat.2005.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cimorelli Belfiore, Roberta, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci. "Hierarchical Key Assignment Schemes with Key Rotation." In SACMAT 2024: The 29th ACM Symposium on Access Control Models and Technologies. ACM, 2024. http://dx.doi.org/10.1145/3649158.3657037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Pingjian, Jing Lin, Jiwu Jing, and Yongquan Xie. "Mediated Hierarchical Identity-Based Combined Public Key Schemes." In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI). IEEE, 2010. http://dx.doi.org/10.1109/iitsi.2010.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ateniese, Giuseppe, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci. "Provably-secure time-bound hierarchical key assignment schemes." In the 13th ACM conference. ACM Press, 2006. http://dx.doi.org/10.1145/1180405.1180441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Duan, Xiaoni, and Keishi Tajima. "Improving Multiclass Classification in Crowdsourcing by Using Hierarchical Schemes." In The World Wide Web Conference. ACM Press, 2019. http://dx.doi.org/10.1145/3308558.3313749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shankar, Prabhu, Beshoy Morkos, and Joshua D. Summers. "A Hierarchical Modeling Scheme With Non Functional Requirements." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28544.

Full text
Abstract:
This paper presents a sequence of multi domain matrix based modeling scheme, that includes non functional design requirements, to capture conceptual design information. The current matrix based modeling schemes are congruent to the steps followed in typical design processes but are limited to functional requirements. An industrial case study is analyzed to understand how and where the non functional requirements contribute to the design. It is observed from the case study that the non functional requirements drive the design decision process and constrains the way the product functionality is
APA, Harvard, Vancouver, ISO, and other styles
9

Hill, Elyse D., Donald L. Simon, and Joseph W. Connolly. "A Comparison of Model Predictive Control Architectures for Application to Electrified Aircraft Propulsion Systems." In ASME Turbo Expo 2024: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2024. http://dx.doi.org/10.1115/gt2024-123859.

Full text
Abstract:
Abstract As electrified aircraft propulsion (EAP) systems continue to mature, more sophisticated hardware and software are being developed to balance operations among electric machines and gas-turbine engines. In hybrid-electric propulsion systems, the increased complexity resulting from integrating turbine-engine shafts with electric machines necessitates control methodologies to account for various physical domains. Ideal controllers for hybrid-electric engines manage systems, subsystems, and their interactions in a coordinated fashion, able to account for safety and performance goals while
APA, Harvard, Vancouver, ISO, and other styles
10

Saha, Sajal, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K. Mukhupadhyay, and Dhinaharan Nagamalai. "Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes." In 2009 First International Conference on Networks & Communications. IEEE, 2009. http://dx.doi.org/10.1109/netcom.2009.81.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hierarchical schemes"

1

Cooper, David A., Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, and Carl A. Miller. Recommendation for Stateful Hash-Based Signature Schemes. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.800-208.

Full text
Abstract:
This recommendation specifies two algorithms that can be used to generate a digital signature, both of which are stateful hash-based signature schemes: the Leighton-Micali Signature (LMS) system and the eXtended Merkle Signature Scheme (XMSS), along with their multi-tree variants, the Hierarchical Signature System (HSS) and multi-tree XMSS (XMSSMT).
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Jun, Chi-Wang Shu, and Mengping Zhang. A High Order WENO Scheme for a Hierarchical Size-Structured Model. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada468112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Struik, L. C., and M. B. Quat. Hierarchical classification of tectonic assemblages for use with thematic, computer-based query systems: a preliminary scheme. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2002. http://dx.doi.org/10.4095/213699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Telles, Edward E., Stanley R. Bailey, Shahin Davoudpour, and Nicholas C. Freeman. Racial and Ethnic Inequality in Latin America. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005238.

Full text
Abstract:
This chapter examines socioeconomic inequality in Latin America through the lens of race and ethnicity. We primarily use national census data from the International Public Use Micro Data Sample (IPUMS). Since censuses use inconsistent measures of race and ethnicity, we also draw on two additional measures from the Latin American Public Opinion Project (LAPOP). Unlike censuses, LAPOP data offer a more consistent ethnoracial scheme across countries and a unique interviewer-rated skin color measure. Our study shows that black and indigenous populations and those with darker skin color experience
APA, Harvard, Vancouver, ISO, and other styles
5

Neroda, Tetyana V., Lidia V. Slipchyshyn, and Ivan O. Muzyka. Adaptive toolkit of branch-oriented workshop environment for enlargement the cloud-based e-learning media platform. [б. в.], 2021. http://dx.doi.org/10.31812/123456789/4449.

Full text
Abstract:
The ways of providing comprehensive efficiency increase in communication facilities of the academic space are given with regard to stipulated methods of managing distributed network resources. Selected the user interfaces types are distinguished according to user actions in the studied subject area, which made it possible to justify and hierarchically organize the categories of adaptive toolkit of the branch- oriented workshop environment by the classes of components declared in the project, which are closely related to the scheme of learning experiment and are basic means for simulating trans
APA, Harvard, Vancouver, ISO, and other styles
6

Lawley, C. J. M., P. Giddy, L. Katz, et al. Canada geological map compilation. Natural Resources Canada/CMSS/Information Management, 2024. http://dx.doi.org/10.4095/pf995j5tgu.

Full text
Abstract:
The Canada Geological Map Compilation (CGMC) is a database of previously published bedrock geological maps sourced from provincial, territorial, and other geological survey organizations. The geoscientific information included within these source geological maps was standardized, translated to English, and combined to provide complete coverage of Canada and support a range of down-stream machine learning applications. Detailed lithological, mineralogical, metamorphic, lithostratigraphic, and lithodemic information was not previously available as one national-scale product. The source map data
APA, Harvard, Vancouver, ISO, and other styles
7

Lawley, C. J. M., P. Giddy, L. Katz, et al. Canada geological map compilation. Natural Resources Canada/CMSS/Information Management, 2024. http://dx.doi.org/10.4095/332596.

Full text
Abstract:
The Canada Geological Map Compilation (CGMC) is a database of previously published bedrock geological maps sourced from provincial, territorial, and other geological survey organizations. The geoscientific information included within these source geological maps was standardized, translated to English, and combined to provide complete coverage of Canada and support a range of down-stream machine learning applications. Detailed lithological, mineralogical, metamorphic, lithostratigraphic, and lithodemic information was not previously available as one national-scale product. The source map data
APA, Harvard, Vancouver, ISO, and other styles
8

Wells, Aaron, Tracy Christopherson, Gerald Frost, et al. Ecological land survey and soils inventory for Katmai National Park and Preserve, 2016–2017. National Park Service, 2021. http://dx.doi.org/10.36967/nrr-2287466.

Full text
Abstract:
This study was conducted to inventory, classify, and map soils and vegetation within the ecosystems of Katmai National Park and Preserve (KATM) using an ecological land survey (ELS) approach. The ecosystem classes identified in the ELS effort were mapped across the park, using an archive of Geo-graphic Information System (GIS) and Remote Sensing (RS) datasets pertaining to land cover, topography, surficial geology, and glacial history. The description and mapping of the landform-vegetation-soil relationships identified in the ELS work provides tools to support the design and implementation of
APA, Harvard, Vancouver, ISO, and other styles
9

McPhedran, R., K. Patel, B. Toombs, et al. Food allergen communication in businesses feasibility trial. Food Standards Agency, 2021. http://dx.doi.org/10.46756/sci.fsa.tpf160.

Full text
Abstract:
Background: Clear allergen communication in food business operators (FBOs) has been shown to have a positive impact on customers’ perceptions of businesses (Barnett et al., 2013). However, the precise size and nature of this effect is not known: there is a paucity of quantitative evidence in this area, particularly in the form of randomised controlled trials (RCTs). The Food Standards Agency (FSA), in collaboration with Kantar’s Behavioural Practice, conducted a feasibility trial to investigate whether a randomised cluster trial – involving the proactive communication of allergen information a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!