Showing 1 - 10 of 498
RFID system. We present four protocols in this thesis. First, we propose a lightweight authentication protocol for typical …Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy …
Persistent link: https://www.econbiz.de/10009484555
With internet expanding in every aspect of businesses infrastructure, it becomes more and more important to make these businesses infrastructures safe and secure to the numerous attacks perpetrated on them conspicuously when it comes to denial of service (DoS) attacks. A Dos attack can be...
Persistent link: https://www.econbiz.de/10009440792
, the authors demonstrate the use of this methodology to develop a financially viable, short-term trading system. When … developing short-term systems, the authors typically site the neural network within an already existing non-neural trading system …. This paper briefly reviews an existing medium-term long-only trading system, and then works through the Vanstone and Finnie …
Persistent link: https://www.econbiz.de/10009441622
Goodness-of-fit test statistics are widely used in health and medicine related surveys however little regard is usually given to their statistical power. This paper investigates the simulated power of five categorical goodness-of-fit test statistics used to analyze health and medicine survey...
Persistent link: https://www.econbiz.de/10009441772
Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of...
Persistent link: https://www.econbiz.de/10009447221
supply being implemented as a network service, such schemes are rigid or slow and costly, This paper proposes a system that …
Persistent link: https://www.econbiz.de/10009447284
Advances in technology have made it possible to collect data about individuals and the connections between them, such as email correspondence and friendships. Agencies and researchers who have collected such social network data often have a compelling interest in allowing others to analyze the...
Persistent link: https://www.econbiz.de/10009467752
Social and computer networks permeate our lives. Large networks, such as the Internet, the World Wide Web (WWW), AND wireless smartphones, have indisputable economic and social importance. These networks have non-trivial topological features, i.e., features that do not occur in simple networks...
Persistent link: https://www.econbiz.de/10009467830
requiring O(|S|3) to directly solve the Bellman system of |S| linear equations (where |S| is the state space size in the …
Persistent link: https://www.econbiz.de/10009467909
Eligibility traces have been shown to speed reinforcement learning, to make it more robust to hidden states, and to provide a link between Monte Carlo and temporal-difference methods. Here we generalize eligibility traces to off-policy learning, in which one learns about a policy different from...
Persistent link: https://www.econbiz.de/10009468145