نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
Although this isn’t surprising, it’s a tad disappointing. Most of us joined the industry because we liked doing things. We get pleasure from the act of creation and from activities that surround the creation process. But as time goes on, we start to lose sight of this. Companies aren’t interested in the process as much as the product. Managers can’t measure the thought that goes in to a specifi...
The process of selection, configuration and consumption of tourist information services is a complex task for the user. This is not least since existing tools most often focus on supporting either the preor post-trip phase or the on-trip phase itself by providing context-aware services. The goal of this thesis is to establish a framework that makes pre-trip services context-aware, thus reducing...
The progress in context-aware systems is predominantly technology-driven, leading to innovations in technology-savvy industries while having almost no impact on other industries, such as the insurance sector. In this paper we introduce a novel, key player-oriented framework that explicitly takes into account the (business) value for each player being relevant when implementing a particular cont...
This paper describes a conceptual model for reasoning about context. The concepts introduced here may be applied in designing context-aware services and modelling context-sensitive interactions between context-aware systems. We introduce the concept of “primitive context” as the basic context abstraction. The concept of “primitive context” effectively captures the notion of “context” and provid...
In our everyday life, we communicate with each other within a certain context; our actions are also within a certain context. Events affect every aspect of human life. The importance of the context also influences how we interact with the environment and how technologies provide services for us. The Context is generally regarded as data or information which describes the situation that is relev...
This paper describes a conceptual model for reasoning about context. The concepts introduced here may be applied in designing context-aware services and modelling contextsensitive interactions between context-aware systems. We introduce the concept of “primitive context” as the basic context abstraction. The concept of “primitive context” effectively captures the notion of “context” and provide...
Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently involving trustable nodes. The values are estimated based on reputation of each node in using different mechanisms. However, these mechanisms have various challenging issues which degrade performance. Hence, n...
how to cite this article: akhondian j, ashrafzadeh f, beiraghi toosi m, hashemi n. a rare presentation of neurobrucellosis in a child with recurrent transient ischemic attacks and pseudotumor cerebri (a case report and review of literature). iran j child neurol. 2014 spring; 8(2):65-69. brucellosis is a multi-system infectious disease that presents with various manifestations and complication...
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید