Xem 1-20 trên 92 kết quả Accessible domains
  • Windows Server 2003 built-in local security groups (the screenshot is taken on the domain controller) Standard security settings are applied by Security Configuration Manager during the operating system installation,

    pdf7p kisiheo 26-07-2010 31 4   Download

  • In this paper, we introduce a multilingual access and retrieval system with enhanced query translation and multilingual document retrieval, by mining bilingual terminologies and aligned document directly from the set of comparable corpora which are to be searched upon by users. By extracting bilingual terminologies and aligning bilingual documents with similar content prior to the search process provide more accurate translated terms for the in-domain data and support multilingual retrieval even without the use of translation tool during retrieval time....

    pdf4p hongphan_1 15-04-2013 20 2   Download

  • This research explores the idea of inducing domain-specific semantic class taggers using only a domain-specific text collection and seed words. The learning process begins by inducing a classifier that only has access to contextual features, forcing it to generalize beyond the seeds. The contextual classifier then labels new instances, to expand and diversify the training set. Next, a cross-category bootstrapping process simultaneously trains a suite of classifiers for multiple semantic classes. ...

    pdf11p hongdo_1 12-04-2013 16 1   Download

  • In this paper, we outline a theory of referential accessibility called Veins Theory (VT). We show how VT addresses the problem of "left satellites", currently a problem for stack-based models, and show that VT can be used to significantly reduce the search space for antecedents. We also show that VT provides a better model for determining domains of referential accessibility, and discuss how VT can be used to address various issues of structural ambiguity.

    pdf9p bunrieu_1 18-04-2013 12 1   Download

  • Zn the past decade, a number of natural language database access systems have been constructed (e.g. Hendrix 1976; Waltz et e l . 1976; Sacerdoti 1978; Harris 1979; Lehner~ and Shwartz 1982; Shvartz 1982). The level of performance achieved by natural language database access systems varies considerably, with the sore robust systems o p e r a t i n g v i t h t n a narrow domain ( i . e . , content area) and r e l y i n g heavily on domain-specif i c knowledge to guide the language understanding process. Transporting...

    pdf3p bungio_1 03-05-2013 16 1   Download

  • Network Access Protection là một công nghệ mới có trong Windows Server 2008, cho phép bạn có thể điều khiển những máy tính nào được phép kết nối với các máy tính khác trong mạng của mình.

    pdf23p nguyen2 10-11-2009 148 76   Download

  • Offers hierarchy—each layer has specific role • Modular topology—building blocks • Easy to grow, understand, and troubleshoot • Creates small fault domains—clear demarcations and isolation • Promotes load balancing and redundancy • Promotes deterministic traffic patterns • Incorporates balance of both Layer 2 and Layer 3 technology, leveraging the strength of both • Can be applied to all campus designs; multilayer L2/L3 and routed access designs

    pdf96p kieuoanh 11-08-2009 84 12   Download

  • Case Study: Service Quality Support in an IP-based Cellular RAN In this chapter, we shall study an IP-based Radio Access Network (RAN) as an example of applying the technologies of the preceding chapters. In the framework of preceding chapters, an IP RAN can be considered to be a multi-service Internet access domain supporting endpoint mobility. From the viewpoint of DiffServ, mobility is handled on the link layer. The traffic engineering framework of IETF is used to structure the example.

    pdf23p huggoo 20-08-2010 59 10   Download

  • This kit introduces the various tools for administering and configuring Windows 2000 including the Microsoft Management Console, Task Scheduler, Control Panel, and the registry. You will learn about the network protocols and services that ship with Windows 2000. This kit concentrates on Transmission Control Protocol/Internet Protocol (TCP/IP), the network protocol of choice for Windows 2000.

    pdf590p maiphuong 11-08-2009 64 8   Download

  • Chức năng Đây là chế độ không sử dụng FTP User Isolation, ở mode này không giới hạn truy xuất của người dùng. Thông thường ta sử dụng mode này để tạo một public FTP Site. Mode này chứng thực người dùng cục bộ (Local User) và người dùng miền (Domain User) truy xuất vào FTP Site. Đối với mode người quản trị phải tạo cho mỗi người dùng một thư mục con của thư mục FTP Root, với tên thư mục này là username của người dùng....

    pdf11p phuoctam26 14-06-2011 34 7   Download

  • TERMS OF USE: You are not authorized to access or query our Whois database through the use of electronic processes that are high-volume and automated except as reasonably necessary to register domain names or modify existing registrations; the Data in VeriSign Global Registry Services' ("VeriSign") Whois database is provided by VeriSign for information purposes only, and to assist persons in obtaining information about or related to a domain name registration record. VeriSign does not guarantee its accuracy.

    doc81p dthavn 16-12-2009 58 6   Download

  • “If the Internet were a city street, I would not travel it in daylight,” laments a chief information security officer for a prestigious university. The Internet is critical infrastructure at the world’s commerce. Cybercrime is escalating; once the domain of hackers and script kiddies, cyber-gangs and organized criminal organizations have discovered the business opportunities for extortion, embezzlement, and fraud that now surpasses income from illegal drug trafficking.

    pdf489p kadi21 17-05-2013 54 6   Download

  • Hindawi Publishing Corporation Journal of Inequalities and Applications Volume 2011, Article ID 131240, 14 pages doi:10.1155/2011/131240 Research Article Size of Convergence Domains for Generalized Hausdorff Prime Matrices T. Selmanogullari,1 E. Savas,2 and B. E. Rhoades3 ¸ 1 2 Department of Mathematics, Mimar Sinan Fine Arts University, Besiktas, 34349 Istanbul, Turkey Department of Mathematics, Istanbul Commerce University, Uskudar, 34672 Istanbul, Turkey 3 Department of Mathematics, Indiana University, Bloomington, IN 47405-7106, USA Correspondence should be addressed to T.

    pdf14p dauphong13 09-02-2012 31 5   Download

  • To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance.

    ppt39p leminh74 03-10-2012 22 5   Download

  • The aim of this book of essays is to advance contemporary work in creating stronger links between the history and philosophy of mathematics. It has become clear through several conferences and publications that the present situation at the beginning of the twenty-first century is congenial to this kind of historico-philosophical enterprise. The editors have brought together an important international group of scholars whose contributions focus on the history and philosophy of modern mathematics, roughly from 1800 to 1970....

    pdf455p camchuong_1 08-12-2012 27 5   Download

  • Introduction to Check Point Mobile for Windows Check Point Mobile for Windows is a remote access client for easy, secure connectivity to corporate resources over the internet, through a VPN tunnel.The Installation Process Important - To install a Remote Access Client on any version of Windows, you need Administrator permissions. Consult with your system administrator. To install a Remote Access Client: 1. Log in to Windows with a user name that has Administrator permissions. 2. Get the installation package from your system administrator, and double-click the installation package. 3.

    pdf17p hoangtumayman 20-08-2012 19 4   Download

  • The performance of current transport systems is inadequate when viewed in terms of economic efficiency, sustainability, and safety. Towards Better Performing Transport Networks examines the tools that are necessary to effectively measure these systems and those that are required to improve them. Utilising advanced tools of network analysis, the contributors challenge various pieces of conventional wisdom and in particular the view that intermodal transport is more environmentally benign than road transport.

    pdf393p baobinh1311 25-09-2012 19 4   Download

  • Windows 8 introduces a new concept called a “connected account” that provides: • The ability to “roam” your personalization settings (for example, your Lock screen picture or your desktop background) across multiple computers Single sign-on for Windows Live services that require a Microsoft account (also known as a Windows Live ID) for authentication ® Customization note: This document contains guidance and/or step-by-step installation instructions that can be reused, customized, or deleted entirely if they do not apply to your organization’s environment or installation sce...

    pdf4p sadsad249 06-01-2013 25 4   Download

  • In this scholarly yet highly accessible work, Eva Hemmungs Wirten traces three main themes within the scope of cultural ownership: au- thorship as one of the basic features of print culture, the use of intellec- tual property rights as a privileged instrument of control, and, finally, globalization as a precondition under which both operate. Underwrit- ten by rapid technological change and increased global interdepend- ence, intellectual property rights are designed to protect a production that is no longer industrial, but informational....

    pdf248p lyly_5 23-03-2013 23 4   Download

  • As technology progresses and as more and more personal data is digitized, there is even more of an emphasis required on data security today than there has ever been. Protecting this data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. Many attempts have been made to solve this problem within the cryptographic community. In this book, we present one of these data security methods known as visual cryptography (VC).

    pdf144p tuanloc_do 03-12-2012 24 2   Download

Đồng bộ tài khoản