Displaying 5711 - 5720 of 37878

We present the design and implementation of a compiler that generates two-party cryptographic protocols automatically.

In order for a cloud operator to make effective decisions with respect to horizontal scaling, migration, and root cause analysis, current cloud orchestration tools often need to monitor application

Administering the Intercept Data Base By J. H. CARRAN, K. E. GREISEN, W. G. HALL, and D. J.

Development Support Systems By I. D. BUCK, G. D. CRUDUP, C. W. KEMP, and G. C.

File Subsystem By J. W. HOPKINS, P. D. HUNTER, R. E. MACHOL, J. J. DiSALVO, and R. J.

The stored program for the Automatic Intercept System (AIS)1 directs the operation of equipment which processes intercept calls.

Copyright © 1974, American Telephone, and Telegraph Company. Printed in U.S.A. Automatic Intercept System: Organization and Objectives By C. J. BYRNE, W. A. WINCKELMANN, and R. M.

Peripheral Circuits By P. J. BRENDEL, W. K. COMELLA, R. N. MARKSON, P. J. MOYLAN, and J.

Data privacy is a major problem that has to be considered before releasing datasets to the public or even to a partner company that would compute statistics or make a deep analysis of these data.

63-t THE BELL SYSTEM TECHNICAL JOURNAL, MAY 1953 higher value will not cause a permanent signal, but its presence may interfere with other circuit functions, for example, dial pulses are distorted