Acknowledgment of Ad Hoc Reviewers.
نویسنده
چکیده
Abravanel, Florence Ackermann, Mathias Admon, Arie Afonso, Claudio L. Agbandje-McKenna, Mavis Agol, Vadim I. Aguilar, Hector C. Aguilar, Patricia V. Ahn, Byung-Yoon Ahn, Jin-Hyun Ahn, Jinwoo Ahn, Kwangseog Akari, Hirofumi Alam, S. Munir Albert, Jan Albin, John S. Alcami, Antonio Alcami, José Aldovini, Anna Al-Harthi, Lena Alkhatib, Ghalib Almazan, Fernando Alonso, Sylvie Altan-Bonnet, Nihal Altfeld, Marcus Altman, John D. Alvisi, Gualtiero Amalfitano, Andrea Amara, Rama Rao Amarasinghe, Gaya Ambinder, Richard Frederick Ambrose, Zandrea Amicosante, Massimo Ancuta, Petronela Anderson, Larry Andino, Raul Andresdottir, Valgerdur Angulo, Ana Ansari, Aftab A. Anthony, Simon J. Apetrei, Cristian Aranda, Miguel A. Arbuthnot, Patrick Archin, Nancy M. Arita, Minetaro Arruda, Eurico Arthos, James Arts, Eric J. Asgari, Sassan Atmar, Robert L. Avirutnan, Panisadee Ayllon, Juan Badley, Andrew D. Badovinac, Vladimir Bahl, Justin Baillie, Gregory John Baize, Sylvain Balasuriya, Udeni B. R. Ball, Jonathan K. Balzarini, Jan Bambara, Robert Bamford, Dennis H. Banerjee, Ashish Bannert, Norbert Bansal, Anju Bar, Katharine J. Barbeau, Benoit Barclay, Wendy S. Barik, Sailen Barin, Francis Barker, Edward Barr, Ian G. Barry, Peter A. Bartlett, Paul C. Basu, Anirban Baum, Alina Baumert, Thomas F. Beale, Rupert Beard, Michael R. Beasley, David Becker, Stephan Beckham, J. David Bell, Andrew Ian Belsham, Graham John Belshaw, Robert Benaroch, Philippe Benedict, Chris A. Benko, Maria Bennett, Shannon N. Bergmann, Cornelia C. Bergmann, Michael Berk, Arnold J. Berns, Kenneth I. Berthoux, Lionel Bertoletti, Antonio Bessen, Richard A. Bhaduri-McIntosh, Sumita Bielefeldt-Ohmann, Helle Bieniasz, Paul D. Bienkowska-Szewczyk, Krystyna Biron, Christine A. Bisaro, David M. Bishop, Kate Blaas, Dieter Blackbourn, David Blaho, John A. Blair, Carol D. Blanco, Jorge Carlos Block, Timothy M. Blondel, Bruno Blondel, Danielle D. Bloom, Jesse D. Boasso, Adriano Bogunovic, Dusan Bohne, Jens Bomsel, Morgane Boonstra, Andre Borca, Manuel V. Bortz, Eric Bosinger, Steven E. Bossers, Alex Botten, Jason W. Bouchard, Michael J. Bouvier, Nicole M. Bowden, Thomas Alexander Bowman, Andrew S. Boyce, Walter M. Braakman, Ineke Braciale, Thomas Bradrick, Shelton S. Branch, Andrea D. Brandt, Curtis R. Branton, Philip E. Brasier, Allan R. Brault, Aaron Breidt, Frederick Brennan, Benjamin Bressanelli, Stéphane Briddon, Robert W. Briese, Thomas Briggs, John A. G. Brighty, David W. Briley, Ken Brindley, Melinda A. Brooke, Christopher B. Brooks, David Brown, Amanda Brown, Earl G. Brown, Richard Browne, Edward P. Brumme, Zabrina L. Brune, Wolfram Brunetti, Craig R. Bryant, Neil Buch, Shilpa Buchholz, Ursula J. Bujarski, Jozef J. Bukh, Jens Bukreyev, Alexander
منابع مشابه
Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LA...
متن کامل2 Systematic Selective Distinct Nonsystematic Identical
| Software requirements speciications (SRS) are often validated manually. One such process is inspection, in which several reviewers independently analyze all or part of the speciication and search for faults. These faults are then collected at a meeting of the reviewers and author(s). Usually, reviewers use Ad Hoc or Checklist methods to uncover faults. These methods force all reviewers to rel...
متن کاملSystematic Selective Distinct Nonsystematic Identical
| Software requirements speciications (SRS) are often validated manually. One such process is inspection, in which several reviewers independently analyze all or part of the speciication and search for faults. These faults are then collected at a meeting of the reviewers and author(s). Usually, reviewers use Ad Hoc or Checklist methods to uncover faults. These methods force all reviewers to rel...
متن کاملComputer Science COMP 4905 - Honours Project Backbone Network Construction in Ad Hoc Wireless Networks
.............................................................................................................................. 1 Acknowledgment ................................................................................................................ 2 Table of
متن کاملSecurity Enhanced Adaptive Acknowledgment Intrusion Detection System
Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET is a collection of wireless mobile nodes forming a network without using any existing infrastructure. In recent years, the use of mobile ad hoc network has been widespread in many applications, security has a most important service in Mobile ad hoc Network compared to other networks. The open medium and wi...
متن کاملSecurity Enhanced Adaptive Acknowledgment Intrusion Detection System
Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET is a collection of wireless mobile nodes forming a network without using any existing infrastructure. In recent years, the use of mobile ad hoc network has been widespread in many applications, security has a most important service in Mobile ad hoc Network compared to other networks. The open medium and wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of virology
دوره 89 24 شماره
صفحات -
تاریخ انتشار 2015