Xem 1-20 trên 219 kết quả Set the rules
  • This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Information Security Policy - A Development Guide for Large and Small Companies A security policy should fulfill many purposes.

    pdf43p ken333 07-06-2012 58 13   Download

  • Over the period 2001-2005, Post Offices in Senegal and Tunisia experienced a continued growth of international money transfer flows both in the number of transactions and volume of transactions. The Post Office claims that its market share doubled over this period from 14/15% up to 30% in Senegal. The average amount per transaction was less than USD 250 in Senegal while it slightly declined from 1,200 USD in 2001 to about 560 USD in 2005 at the Tunisia Post.

    pdf4p machuavo 19-01-2013 17 2   Download

  • As an additional strategy, we also consider household assets as instruments. This identification strategy allows considering municipality fixed effects but assumes that decisions over the household assets considered do not depend or respond to shocks to child health. The use of community fixed effects is particularly appealing, as it will control for the absence of the long-run price structure. However, we will have to assume that transitory price changes do not influence child health.

    pdf76p can_thai 12-12-2012 12 1   Download

  • The income lost among the hospitalized group was estimated at $156/patient and about $114 in the non-hospitalized patients group. Age, gender, facility of diagnosis, level of education and occupation were significant (p-values

    pdf8p taisaocothedung 12-01-2013 17 1   Download

  • Association rules represent a promising technique to find hidden patterns in a medical data set. The main issue about mining association rules in a medical data set is the large number of rules that are discovered, most of which are irrelevant. Such number of rules makes search slow and interpretation by the domain expert difficult. In this work, search constraints are introduced to find only medically significant association rules and make search more efficient.

    pdf8p lebronjamesuit 23-08-2012 39 6   Download

  • This technical report addresses inter-networked building automation and control systems (BAS or BCS) using the BACnet protocol [ANSI/ASHRAE, 2001]. The report deals with threats from known sources due to communication connections to the corporate LAN and the public Internet as well as physical threats to the building automation equipment and attached computers. Weaknesses of the protocol, BACnet 2001, and of the physical implementation will be examined.

    pdf23p khongmuonnghe 04-01-2013 19 5   Download

  • Data warehouses usually have some missing values due to unavailable data that affect the number and the quality of the generated rules. The missing values could affect the coverage percentage and number of reduces generated from a specific data set. Missing values lead to the difficulty of extracting useful information from data set. Association rule algorithms typically only identify patterns that occur in the original form throughout the database.

    pdf6p giacattan 05-01-2013 20 5   Download

  • My desire to write a book about C++Builder has some history. I have been very impressed with Borland since their first edition of C++ (and prior editions of C), because they have always made an effort to ensure quality. Unfortunately, there are very few books on the market about Borland C++ or C++Builder, compared to other products like Visual Basic or Visual C++. Since different authors have different viewpoints of a product, I always prefer to consult more than one book to gain in-depth knowledge, as every author provides a unique service with his or her expertise.

    pdf529p hotmoingay3 09-01-2013 21 5   Download

  • Technologies are playing a critical role in reducing the costs of transmitting transaction details between the customer, the retailer, the financial service provider and eventually third parties. Payment facilities encompass a variety of products (e.g. giro accounts, call accounts, transaction accounts,..) and services (e.g. bill payment, check payment, direct debit, stop orders, money transfers, credit transfers, disburse- ments, e-payments, mobile payments,…) for managing the transfer of funds to/from a customer or a third party.

    pdf24p machuavo 19-01-2013 16 5   Download

  • Once your computer is connected to the internet, it’s also connected to millions of other connected computers, which could, in turn, allow attackers to connect to your computer. Information flows from the internet to your home network by first coming into your modem, then to your router, which most people have, and finally to your computer. Because your modem doesn’t have security settings, it’s crucial to secure your router—the first securable device that receives information from the internet.

    pdf8p khongmuonnghe 04-01-2013 21 4   Download

  • This last observation is important, and combined with the flexibility of DNS, is crucial to our work. Since the domain name hierarchy is used by many modern electronic applications, there are several advantages to being able to store related information about a domain name (such as a public key in the form of a certificate) in DNS. To see this, consider a separate infrastructure for locating certificates.

    pdf413p cao_can 02-01-2013 33 3   Download

  • Inheritance is the practice of passing on property, titles, debts, rights and obligations upon the death of an individual. It represents also to pass a characteristic, genetically. It has long played an important role in human societies. The rules of inheritance differ between societies and have changed over time.

    ppt31p trada85 20-01-2013 14 3   Download

  • For an equivalent level of security, elliptic curve cryptography uses shorter key sizes and is considered to be an excellent candidate for constrained environments like wireless/mobile communications. In FIPS 186-2, NIST recommends several finite fields to be used in the elliptic curve digital signature algorithm (ECDSA). Of the ten recommended finite fields, five are binary extension fields with degrees ranging from 163 to 571. The fundamental building block of the ECDSA, like any ECC based protocol, is elliptic curve scalar mul- tiplication.

    pdf0p cao_can 02-01-2013 20 2   Download

  • The standard set of rules defined in Combinatory Categorial Grammar (CCG) fails to provide satisfactory analyses for a number of syntactic structures found in natural languages. These structures can be analyzed elegantly by augmenting CCG with a class of rules based on the combinator D (Curry and Feys, 1958). We show two ways to derive the D rules: one based on unary composition and the other based on a logical characterization of CCG’s rule base (Baldridge, 2002).

    pdf9p hongphan_1 15-04-2013 14 2   Download

  • Treebanks, such as the Penn Treebank (PTB), offer a simple approach to obtaining a broad coverage grammar: one can simply read the grammar off the parse trees in the treebank. While such a grammar is easy to obtain, a square-root rate of growth of the rule set with corpus size suggests that the derived grammar is far from complete and that much more treebanked text would be required to obtain a complete grammar, if one exists at some limit. However, we offer an alternative explanation in terms of the underspecification of structures within the treebank. This hypothesis is explored...

    pdf5p bunrieu_1 18-04-2013 15 2   Download

  • Combinatory Categorial Grammar (CCG) is generally construed as a fully lexicalized formalism, where all grammars use one and the same universal set of rules, and crosslinguistic variation is isolated in the lexicon. In this paper, we show that the weak generative capacity of this ‘pure’ form of CCG is strictly smaller than that of CCG with grammar-specific rules, and of other mildly context-sensitive grammar formalisms, including Tree Adjoining Grammar (TAG). Our result also carries over to a multi-modal extension of CCG. ...

    pdf10p hongdo_1 12-04-2013 15 1   Download

  • This paper describes an architecture to convert Sinhala Unicode text into phonemic specification of pronunciation. The study was mainly focused on disambiguating schwa-/\/ and /a/ vowel epenthesis for consonants, which is one of the significant problems found in Sinhala. This problem has been addressed by formulating a set of rules. The proposed set of rules was tested using 30,000 distinct words obtained from a corpus and compared with the same words manually transcribed to phonemes by an expert. The Grapheme-to-Phoneme (G2P) conversion model achieves 98 % accuracy. ...

    pdf8p hongvang_1 16-04-2013 13 1   Download

  • An algorithm for generating the possible quantifier scopings for a sentence, in order of preference, is outlined. The scoping assigned to a quantifier is determined by its interactions with other quantifiers, modals, negation, and certain syntacticconstituent boundaries. When a potential scoping is logically equivalent to another, the less preferred one is discarded. The relative scoping preferences of the individual quantifiers are not embedded in the algorithm, but are specified by a set of rules.

    pdf8p bungio_1 03-05-2013 11 1   Download

  • We describe refinements to hierarchical translation search procedures intended to reduce both search errors and memory usage through modifications to hypothesis expansion in cube pruning and reductions in the size of the rule sets used in translation. Rules are put into syntactic classes based on the number of non-terminals and the pattern, and various filtering strategies are then applied to assess the impact on translation speed and quality. Results are reported on the 2008 NIST Arabic-toEnglish evaluation task. ...

    pdf9p bunthai_1 06-05-2013 13 1   Download

  • When I set out to write this book, my topic was stock options. Specifically, my intent was to explore the much debated issue of expensing stock options. While that remains an essential theme of this book, it is impossible to address stock options without looking at the broader picture. Put another way, stock options are the trees; executive compensation and effective corporate governance are the forest.

    pdf225p duypha 15-07-2009 276 183   Download

Đồng bộ tài khoản