نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

Journal: :IEEE Software 2003
Dave Thomas Andy Hunt

Although this isn’t surprising, it’s a tad disappointing. Most of us joined the industry because we liked doing things. We get pleasure from the act of creation and from activities that surround the creation process. But as time goes on, we start to lose sight of this. Companies aren’t interested in the process as much as the product. Managers can’t measure the thought that goes in to a specifi...

2008
Christoph Grün

The process of selection, configuration and consumption of tourist information services is a complex task for the user. This is not least since existing tools most often focus on supporting either the preor post-trip phase or the on-trip phase itself by providing context-aware services. The goal of this thesis is to establish a framework that makes pre-trip services context-aware, thus reducing...

Journal: :Scalable Computing: Practice and Experience 2013
Christine Bauer Christine Strauss Christian Stummer Alexander Trieb

The progress in context-aware systems is predominantly technology-driven, leading to innovations in technology-savvy industries while having almost no impact on other industries, such as the insurance sector. In this paper we introduce a novel, key player-oriented framework that explicitly takes into account the (business) value for each player being relevant when implementing a particular cont...

2004
Andreas Pappas Stephen Hailes Raffaele Giaffreda

This paper describes a conceptual model for reasoning about context. The concepts introduced here may be applied in designing context-aware services and modelling context-sensitive interactions between context-aware systems. We introduce the concept of “primitive context” as the basic context abstraction. The concept of “primitive context” effectively captures the notion of “context” and provid...

2011
N. Neisany Samani M. R. Delavar M. R. Malek

In our everyday life, we communicate with each other within a certain context; our actions are also within a certain context. Events affect every aspect of human life. The importance of the context also influences how we interact with the environment and how technologies provide services for us. The Context is generally regarded as data or information which describes the situation that is relev...

2009
Andreas Pappas Stephen Hailes Raffaele Giaffreda

This paper describes a conceptual model for reasoning about context. The concepts introduced here may be applied in designing context-aware services and modelling contextsensitive interactions between context-aware systems. We introduce the concept of “primitive context” as the basic context abstraction. The concept of “primitive context” effectively captures the notion of “context” and provide...

Journal: :Intelligent Automation and Soft Computing 2023

Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently involving trustable nodes. The values are estimated based on reputation of each node in using different mechanisms. However, these mechanisms have various challenging issues which degrade performance. Hence, n...

Journal: :iranian journal of child neurology 0
javad akhondian* department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran farah ashrafzadeh department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran mehran beiraghi toosi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran nargess hashemi department of pediatric neurology, ghaem medical center, mashhad university of medical sciences, mashhad, iran

how to cite this article: akhondian j, ashrafzadeh f, beiraghi toosi m, hashemi n. a rare presentation of neurobrucellosis in a child with recurrent transient ischemic attacks and pseudotumor cerebri (a case report and review of literature). iran j child neurol. 2014 spring; 8(2):65-69.   brucellosis is a multi-system infectious disease that presents with various manifestations and complication...

Fatemeh Baghernejad Masoumeh Safkhani, Nasour Bagheri

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید