نتایج جستجو برای: farzad 2004

تعداد نتایج: 126361  

2006
Jin-Cherng Lin Yu-Hsin Kao

With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these fu...

2004
Nidal Aboudagga Damien Giry Jean-Jacques Quisquater

Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and int...

2008
Falko Dressler

We focus on the question of self-organized scheduling of event detection in SANETs. This question is especially challenging in very dynamic environments. Recently, a number of self-organization methods have been published that focus on network-centric operation in such networks. Based on our previously developed RSN system, which is a light-weight programming scheme for SANETs, we study the fea...

2014
Federico Marrone Murtada D. Naser Amaal Gh. Yasser Francesco Sacco Marco Arculeo

Some gastropod specimens belonging to the planorbid genus Ferrissia were recently collected in Lebanon and in Iraq, where the autochthonous species Ferrissia clessiniana (Jickeli, 1882) is supposed to occur. The molecular identification of collected specimens proved that they belong to the allochthonous species Ferrissia fragilis (Tryon, 1863), the protagonist of a dramatic cryptic invasion whi...

Journal: :Oper. Res. Lett. 2016
Neil Olver

Robust network design refers to a class of optimization problems that occur when designing networks to efficiently handle variable demands. The notion of “hierarchical hubbing” was introduced (in the narrow context of a specific robust network design question), by Olver and Shepherd [14]. Hierarchical hubbing allows for routings with a multiplicity of “hubs” which are connected to the terminals...

2009
Chunfeng Yuan Xi Li Weiming Hu Hanzi Wang

The bag-of-visual-words (BOVW) approaches are widely used in human action recognition. Usually, large vocabulary size of the BOVW is more discriminative for inter-class action classification while small one is more robust to noise and thus tolerant to the intra-class invariance. In this pape, we propose a pyramid vocabulary tree to model local spatio-temporal features, which can characterize th...

2009
Anjum Naveed Salil Kanhere

The security services of authentication and confidentiality are of significant importance to ensure secure communication in any network. The decentralized nature and the broadcast medium of communication of wireless ad hoc networks results in unique challenges in realizing the services of authentication and data confidentiality. In this chapter, We first highlight the issues relating to authent...

Journal: :Marine pollution bulletin 2013
James L Pinckney Isaac M Hagenbuch Richard A Long Charles R Lovell

Pharmaceuticals are common chemical contaminants in estuaries receiving effluent from wastewater and sewage treatment facilities. The purpose of this research was to examine benthic microalgal (BMA) community responses to sublethal exposures to tylosin, a common and environmentally persistent antibiotic. Bioassays, using concentrations of 0.011-218 μmol tylosin l(-1), were performed on intertid...

2010
Martin Eian

This paper proposes a highly efficient cryptographic denial of service attack against 802.11 networks using 802.11i TKIP and CCMP. The attacker captures one frame, then modifies and transmits it twice to disrupt network access for 60 seconds. We analyze, implement and experimentally validate the attack. We also propose a robust solution and recommendations for network administrators.

Journal: :Brazilian journal of biology = Revista brasleira de biologia 2010
L M Gomiero G A Villares Junior F Naous

The diet of Cichla kelberi introduced in an artificial lake in Leme-SP was predominantly composed of common fish species (Oreochromis niloticus and C. kelberi). In the spring and summer, the most consumed item was O. niloticus. However, cannibalism was very common for this species. The high frequencies of O. niloticus and C. kelberi reveal that this species is adapted to a seasonal cycle, feedi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید