1 resultado para Driving under the Influence of Liquor.
em Bulgarian Digital Mathematics Library at IMI-BAS
Filtro por publicador
- Abertay Research Collections - Abertay University’s repository (1)
- Aberystwyth University Repository - Reino Unido (2)
- Adam Mickiewicz University Repository (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (1)
- Aquatic Commons (28)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (2)
- Archive of European Integration (2)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (3)
- Aston University Research Archive (11)
- Avian Conservation and Ecology - Eletronic Cientific Hournal - Écologie et conservation des oiseaux: (2)
- Biblioteca Digital - Universidad Icesi - Colombia (1)
- Biblioteca Digital da Câmara dos Deputados (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (10)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (3)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (17)
- Boston University Digital Common (4)
- Brock University, Canada (6)
- Bucknell University Digital Commons - Pensilvania - USA (1)
- Bulgarian Digital Mathematics Library at IMI-BAS (1)
- CaltechTHESIS (3)
- Cambridge University Engineering Department Publications Database (108)
- Carolina Law Scholarship Repository (1)
- CentAUR: Central Archive University of Reading - UK (21)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (105)
- Cochin University of Science & Technology (CUSAT), India (1)
- CORA - Cork Open Research Archive - University College Cork - Ireland (9)
- Cornell: DigitalCommons@ILR (1)
- Dalarna University College Electronic Archive (2)
- Digital Commons - Michigan Tech (1)
- Digital Commons at Florida International University (2)
- Digital Knowledge Repository of Central Drug Research Institute (2)
- DigitalCommons@The Texas Medical Center (1)
- Diposit Digital de la UB - Universidade de Barcelona (3)
- DRUM (Digital Repository at the University of Maryland) (1)
- Duke University (2)
- Earth Simulator Research Results Repository (3)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (10)
- Glasgow Theses Service (2)
- Greenwich Academic Literature Archive - UK (7)
- Helda - Digital Repository of University of Helsinki (15)
- Indian Institute of Science - Bangalore - Índia (56)
- Instituto de Engenharia Nuclear, Brazil - Carpe dIEN (1)
- Instituto Politécnico de Viseu (1)
- Instituto Politécnico do Porto, Portugal (1)
- Massachusetts Institute of Technology (1)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (36)
- Portal de Revistas Científicas Complutenses - Espanha (4)
- Publishing Network for Geoscientific & Environmental Data (1)
- QSpace: Queen's University - Canada (2)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (158)
- Queensland University of Technology - ePrints Archive (180)
- RCAAP - Repositório Científico de Acesso Aberto de Portugal (1)
- Repositório Científico da Universidade de Évora - Portugal (2)
- Repositório digital da Fundação Getúlio Vargas - FGV (1)
- Repositorio Institucional de la Universidad de Málaga (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (35)
- Repositorio Institucional Universidad de Medellín (1)
- SAPIENTIA - Universidade do Algarve - Portugal (1)
- Universidad de Alicante (5)
- Universidad Politécnica de Madrid (7)
- University of Michigan (45)
- University of Queensland eSpace - Australia (7)
- Worcester Research and Publications - Worcester Research and Publications - UK (1)
Resumo:
In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.