Angebote zu "Leakage" (5 Treffer)

Kategorien

Shops

Low Leakage Variability Aware Techniques for CM...
89,90 € *
ggf. zzgl. Versand

The broad necessity of battery operated portable applications need to explore the low power VLSI research field. The portable applications such as calculator, hearing aids, portable military equipments, laptop, notebook, mobile phone, implantable pacemaker, wristwatches, etc. have the huge market in current scenario. The longer battery performs the better for all such applications. Minimization of the overall power dissipation gets the battery performance. Leakage power dissipation which is the component of total power dissipation is the dominant part in ultra-DSM regime. Therefore, this book has proposed several circuit level leakage reduction techniques for CMOS circuits. Process variability is considerably increasing with technology scaling and causes performance fluctuations. Parameter variations are affecting the leakage current in several ways in ultra-DSM regime. The effect of PVT variations is considered to measure the reliability issues. All proposed approaches are based on individual CMOS logic. These CMOS logics can be employed to design any low leakage logic circuit.

Anbieter: Dodax
Stand: 19.09.2020
Zum Angebot
Implementation of Guilt Model with Data Watcher...
49,00 € *
ggf. zzgl. Versand

This book is beneficial for those researchers who are working on Database and data ware house and mining. This book is also beneficial for company. In every enterprise, data leakage is very serious problem faced by it. An owner of enterprise has given sensitive data to its employee but in most of the situation employee leak the data. That leak data found in unauthorized place such as on the web of comparator enterprise or on laptop of employee of comparator enterprise or the owner of comparators laptop. It is either observed or sometimes not observed by owner. Leak data may be source code or design specifications, price lists, intellectual property and copy rights data, trade secrets, forecasts and budgets. In this case the data leaked out it leaves the company goes in unprotected the influence of the corporation. This uncontrolled data leakage puts business in a backward position. To find the solution on this problem we develop two models. First, when any employee of enterprise access sensitive data without the consent of owner and the second model for assessing the guilt of agents. Guilt model are used to improve the probability of identifying guilty third parties.

Anbieter: Dodax
Stand: 19.09.2020
Zum Angebot
Data Leakage Detection in Relational Database
61,90 CHF *
ggf. zzgl. Versand

In modern business process sometime sensitive data is distributed to set of supposedly trusted agents (third parties) by the owner of data. If in case distributed data where found at unauthorized place (e.g. on the website or somebody's laptop) then the owner must be able to assess the likelihood that the leaked data come from one or more agents or not. Organizations mainly apply data or information security only in terms of network protection from intruders and hackers, but due to globalization and digitization there is rapid growth in the amount of sensitive data processing applications. In the organizations these data can be accessed from different medium which increases the chances of data leakage and trouble in guilt assessment. Data allocation strategy includes fake records in the distribution set along with sensitive data, it acts as watermark to identify the corresponding owner. If such sensitive information is leaked then with the help of fake records and distribution logic involvement of agent in the leakage can be traced. Suitable data allocation strategy improve's the probability of guilt detection and this reduces the catastrophic effect of data leakage.

Anbieter: Orell Fuessli CH
Stand: 19.09.2020
Zum Angebot
Data Leakage Detection in Relational Database
35,99 € *
ggf. zzgl. Versand

In modern business process sometime sensitive data is distributed to set of supposedly trusted agents (third parties) by the owner of data. If in case distributed data where found at unauthorized place (e.g. on the website or somebody's laptop) then the owner must be able to assess the likelihood that the leaked data come from one or more agents or not. Organizations mainly apply data or information security only in terms of network protection from intruders and hackers, but due to globalization and digitization there is rapid growth in the amount of sensitive data processing applications. In the organizations these data can be accessed from different medium which increases the chances of data leakage and trouble in guilt assessment. Data allocation strategy includes fake records in the distribution set along with sensitive data, it acts as watermark to identify the corresponding owner. If such sensitive information is leaked then with the help of fake records and distribution logic involvement of agent in the leakage can be traced. Suitable data allocation strategy improve's the probability of guilt detection and this reduces the catastrophic effect of data leakage.

Anbieter: Thalia AT
Stand: 19.09.2020
Zum Angebot