• No results found

low storage requirements

PIR schemes with small download complexity and low storage requirements

PIR schemes with small download complexity and low storage requirements

... distributed storage techniques to be ...total storage (in R) that needs at least 2R bits to be ...same storage property, that requires at most (1 + )R bits to be downloaded; moreover one variant of ...

15

PIR schemes with small download complexity and low storage requirements

PIR schemes with small download complexity and low storage requirements

... communication requirements) where the amount of information stored in a server is bounded but the total stor- age is at most (1+) times the database ...the storage overhead using the techniques of PIR array ...

26

Speech Coding Techniques: A Comparative Study

Speech Coding Techniques: A Comparative Study

... capability, low storage requirements, bandwidth conservation and speech quality enhancement with higher signal to noise ratio (SNR) ...at low data rates with accepted speech ...to ...

5

REDUCTION IN POWER FLUCTUATIONS OF MICROGRID USING SUPERCAPACITOR

REDUCTION IN POWER FLUCTUATIONS OF MICROGRID USING SUPERCAPACITOR

... or low voltage distribution systems such as residential building, commercial building, is a market or even a ...energy storage system which is available for DC and AC ...

8

Sun-3_Hardware_Configuration_Guide_Nov89.pdf

Sun-3_Hardware_Configuration_Guide_Nov89.pdf

... Large virtual address space requires large disk swap space in addition to the data storage requirements of the.. applications.[r] ...

146

Domestic thermal storage requirements for heat demand flexibility

Domestic thermal storage requirements for heat demand flexibility

... future, low-carbon energy system in which major demands such as heat and transport are decarbonised ...thermal storage (e.g. hot water tanks, electric storage heating, ...etc.). Storage ...

10

A fast and low-storage algorithm for finding quantile

A fast and low-storage algorithm for finding quantile

... In the simulation described in the next section, our algorithm needs the shifting mechanism about 100 times for finding the .95th sample quantile from a data set of size 500,000, while D[r] ...

10

Exploration of Integrity Checks in Distributed Storage Networks with Secure Erasure Code

Exploration of Integrity Checks in Distributed Storage Networks with Secure Erasure Code

... To provide data robustness is to replicate a message such that each Storage server stores a copy of the message. It isvery robust because the message can be retrieved as long as one storage server survives. ...

6

Performance Analysis of Sensible Heat Storage System

Performance Analysis of Sensible Heat Storage System

... of storage bed is averaged over the entire bed volume thus it is the function of time ...of storage beds is rapid and decreases with ...the storage bed gains the heat of ...to low thermal ...

5

Complying with Security Requirements in Cloud Storage Systems

Complying with Security Requirements in Cloud Storage Systems

... cloud storage systems is to adequately protect the infrastructure itself – the hardware and software that implements the storage ...security requirements that affect these storage systems, ...

6

COTTON GINNERS HANDBOOKCottonseed Air-Handling and Storage Requirements

COTTON GINNERS HANDBOOKCottonseed Air-Handling and Storage Requirements

... absorbs moisture from or gives up moisture to the surrounding air. Storage temperatures below 60 °F (16 °C) and 10% moisture content wet basis provide best storage conditions. Whole, fuzzy cottonseed has ...

13

An Efficient Searching Scheme with Data Integrity and Anonymization on Mobile Cloud

An Efficient Searching Scheme with Data Integrity and Anonymization on Mobile Cloud

... D. Song et al [1]; proposed Practical Techniques for Search on Encrypted Data, it is desirable to store data on data storage servers, but this implies data security. This paper proposes cryptographic schemes for ...

8

A Survey on De-duplication of Distributed Cloud Storage by Improving Confidentiality, Integrity and Reliability

A Survey on De-duplication of Distributed Cloud Storage by Improving Confidentiality, Integrity and Reliability

... cloud storage to reduce storage space and network ...improves storage utilization while reducing ...security requirements of data confidentiality is achieved by introducing deterministic ...

5

Improving quality of winter forage for elk by cattle grazing.

Improving quality of winter forage for elk by cattle grazing.

... an ungrazed forage grass, plant food storage, percent nutrient content, and nutritional value of herbage.. analysis of the seasonal requirements of the wildlife: Wh[r] ...

6

Safeguards Needed in Transfer of Patient Data

Safeguards Needed in Transfer of Patient Data

... the privacy of the patient is further protected, be- cause the storage and transfer of patient information must meet security and confidentiality requirements specified by state and fede[r] ...

5

Pulling the Weight: Base Metal-Catalyzed Dehydrogenation of Amine-Borane Fuel Blends

Pulling the Weight: Base Metal-Catalyzed Dehydrogenation of Amine-Borane Fuel Blends

... • Low volumetric storage capacity of liquid hydrogen can be supplemented by reversible sorbents or metal hydrides. • High storage capacity advantage of chemical hydrides is offset by [r] ...

44

Image retrieval based system on  Image Annotation

Image retrieval based system on Image Annotation

... Both approaches bear many advantages and disadvantages, which depends highly on the application domain. The first approach starts by segmentation, which is problematic by itself. It is based on the assumption that, it is ...

5

An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi Layered Approach

An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi Layered Approach

... The advancement of information communication technologies (ICT) enabled the integration of information systems in cyberspace which is accessible through the Internet and mobile based platforms. Recently, researchers have ...

25

Explicit  Optimal  Binary  Pebbling  for  One-Way  Hash  Chain  Reversal

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal

... We have completely resolved the case of binary pebbling of hash chains by con- structing an explicit optimal schedule. A major advantage of our optimal sched- ule is that it allows for very efficient in-place pebbling ...

21

Improving electricity network utilisation with distributed energy storage systems

Improving electricity network utilisation with distributed energy storage systems

... a low voltage ...energy storage systems and applied at the demand nodes 5 and ...energy storage systems was increased to ...energy storage systems was ...

134

Show all 10000 documents...

Related subjects