10 research outputs found

    Amazigh Representation in the UNL Framework: Resource Implementation

    Get PDF
    AbstractThis paper discusses the first steps undertaken to create necessary linguistic resources to incorporate Amazigh language within the Universal Networking Language (UNL) framework for machine translation purpose. This universal interlanguage allows to any source text to be translated into different other related languages with UNL by converting the meaning of the source text into semantic graph. This encoding is considered as a pivot interlanguage used in translation systems. Thus in this work, we focus on presenting morphological, syntactical and lexical mapping stages needed for building an “Amazigh dictionary” according to the UNL framework and the “UNL-Amazigh Dictionary” that are both taking part in enconversion and deconversion processes

    Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    Get PDF
    Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud

    Composition des fonctions rationnelles et ses aspects combinatoires

    No full text
    BORDEAUX1-BU Sciences-Talence (335222101) / SudocSudocFranceF

    Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    No full text
    Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud

    Cacti, Braids and Complex Polynomials

    No full text
    The study of the topological classification of complex polynomials began in the XIX-th century by Luroth (1871), Clebsch (1873) and Hurwitz (1891). In the works of Zdravkovska [23] and Khovanskii and Zdravkovska [17] the problem is reduced to a purely combinatorial one, that of the study of a certain action of the braid groups on a class of tree-like figures that we, following [14], call "cacti". Using explicit computation of the braid group orbits, enumerative results of [14], and also establishing some combinatorial invariants of the action, we provide the topological classification of polynomials of degree up to 9 (previous results were known up to degree 6). R'esum'e L"etude de la classification topologique des polynomes complexes a commenc'e au XIX-`eme siecle par Luroth (1871), Clebsch (1873) et Hurwitz (1891). Dans les travaux de Zdravkovska [23] et Khovanskii et Zdravkovska [17] le probl`eme est r'eduit `a une 'etude purement combinatoire d'une certaine action du groupe des t..
    corecore