Mostrando 2,341 - 2,360 Resultados de 2,832 Para Buscar '"Hide"', tiempo de consulta: 0.31s Limitar resultados
  1. 2341
    “…Cryptojacking or illegal mining is a form of malware that hides in the victim’s computer and takes the computational resources to extract cryptocurrencies in favor of the attacker. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 2342
    por Liu, Bin, Zhang, Chunyong, Xin, Yang
    Publicado 2023
    “…We design a hierarchical tree-like organization structure, GL-Tree, which enables the storage, management, and retrieval of massive location data and satisfies the user’s location-hiding requirements. We first use Geohash encoding to convert the two-dimensional geospatial coordinates of locations into one-dimensional strings and construct the GL-Tree based on the Geohash encoding principle. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 2343
    “…A layer of caching and latency hiding services, supporting various access protocols will serve the data to heterogeneous facilities, from conventional Grid sites to HPC centres and Cloud providers. …”
    Enlace del recurso
    Enlace del recurso
  4. 2344
    por Rich, Eugene C.
    Publicado 2009
    “…This superficial consensus hides intense disagreements over critical issues essential to any new public effort to promote more comparative effectiveness research (CER). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Texto
  5. 2345
  6. 2346
  7. 2347
  8. 2348
  9. 2349
  10. 2350
    por Zielesny, Achim
    Publicado 2016
    “…The primary goal is to be as illustrative as possible without hiding problems and pitfalls but to address them. …”
    Enlace del recurso
    Enlace del recurso
  11. 2351
    por Kennedy, Kiley Elizabeth
    Publicado 2022
    “…However, overwhelming evidence suggests that the theory is incomplete and that new physics may be hiding at the TeV scale. The Large Hadron Collider (LHC) at CERN probes these high-energy scales, opening a potential gateway to access physics beyond the Standard Model (BSM). …”
    Enlace del recurso
  12. 2352
    “…ROOT offers a modern analysis tool called RDataFrame, which can parallelise computations from a single machine to a distributed cluster while hiding most of the scheduling and result aggregation complexity from users. …”
    Enlace del recurso
    Enlace del recurso
  13. 2353
    por Lespinats, Sylvain, Fertil, Bernard
    Publicado 2011
    “…However, choosing the number of subclasses to display is often a complex task: on the one hand, assigning a limited number of colors to taxa of interest hides the structure imbedded in the subtrees of the taxonomy; on the other hand, differentiating a high number of taxa by giving them specific colors, without considering the underlying taxonomy, may lead to unreadable results since relationships between displayed taxa would not be supported by the color code. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 2354
  15. 2355
    “…VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 2356
  17. 2357
    “…Policies raised awareness of menstruation, often with great noise, but they simultaneously called for hiding and concealing any actual, visible signs of menstruation and its embodied messiness. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 2358
    “…The enrichment paradigm was composed of larger cages housing multiple mice that contained several toys, hiding places, nesting material and a spinning wheel that were moved or replaced at regular intervals. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 2359
    “…In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 2360
    por Sznycer, Daniel, Cohen, Adam Scott
    Publicado 2021
    “…We observe internal and external coherence: The intensities of felt shame and of various motivations of shame (hiding, lying, destroying evidence, and threatening witnesses) vary in proportion (i) to one another, and (ii) to the degree to which audiences devalue the disgraced individual—the threat shame defends against. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS