نتایج جستجو برای: 2004 and 2004

تعداد نتایج: 16841472  

2009
P. Karthikeyan

Six lines and five testers were crossed in line x tester fashion and the F1s were evaluated under coastal saline situation. The ratio between the estimates of additive and dominance variances indicated preponderance of nonadditive gene action for the characters namely, plant height, number of productive tillers, boot leaf length, panicle length, grain weight per primary panicle and grain yield ...

Journal: :Computational Linguistics 2005
Laura Kallmeyer

This article addresses the problem that the expressive power of tree-adjoining grammars (TAGs) is too limited to deal with certain syntactic phenomena, in particular, with scrambling in freeword-order languages. The TAG variants proposed so far in order to account for scrambling are not entirely satisfying. Therefore, the article introduces an alternative extension of TAG that is based on the n...

2011
D. N. Chaudhari

This paper is a brief survey of IEEE 802.11i based WPA2 or Wi-Fi protected Mode protocol popularly called as Wi-Fi Protected Access (WPA) Mode Protocol. In this paper we tried our best to include all possible information about WPA from trusted sources in a very precise manner. Apart from the above the paper also explores wireless networking standards in brief so that one can become familiar wit...

2005
Changhua He John C. Mitchell

This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model, 802.11i appears to provide effective data confidentiality and integrity when CCMP is used. Furthermore, 802.11i may provide satisfactory mutual authentication and key management, although there are some potential impl...

2011
Lena Zipp Volker Dellwo

A new method, the ‘read speech normalization' method (RSN), is proposed by which the variability of prosodic parameters (rhythmic durational and intonation) can be compared across different conditions of spontaneous speech. In an experiment using a customized variety of the map task method, spontaneous speech was elicited from two speakers of English in a formal and an informal situation. Sente...

2004
Kwang-Hyun Baek Sean W. Smith David Kotz

In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.

Journal: :Canadian Medical Association Journal 2004

Journal: :New South Wales Public Health Bulletin 2005

Journal: :Journal of nematology 1999
J L Williams-Woodward F A Gray

Population dynamics of A. ritzemabosi and D. dipsaci were studied in two alfalfa fields in Wyoming. Symptomatic stem-bud tissue and root-zone soil from alfalfa plants exhibiting symptoms of D. dipsaci infection were collected at intervals of 3 to 4 weeks. Both nematodes were extracted from stem tissue with the Baermann funnel method and from soil with the sieving and Baermann funnel method. Soi...

2004
José Cordeiro Joaquim Filipe Alberto B. Raposo Mariano G. Pimentel Marco A. Gerosa Carlos J. P. de Lucena

In this paper we propose a new coordination approach for the AulaNet Learning Management System. The proposed coordination protocol is based on a workflow mechanism that could be used by teachers to define some specific sequence of activities within a course run within AulaNet. This way, at least part of the social protocol that governs the flow of the course could be enforced by software.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید