نتایج جستجو برای: search protocols
تعداد نتایج: 391475 فیلتر نتایج به سال:
bypassing agents are the most commonly used medicines for the treatment of hemophilia patients with inhibitors. the aim of this study is to identify the cost components of management of bleeding vents in hemophilia patients with inhibitors in iran. this study is a cross-sectional study using a bottom-up approach to determine the cost components of treatment of hemophilia patients with inhibitor...
Due to the tremendous growth of Internet Things (IoT) applications - e.g. smart homes, grids, factories – and emerging integration into industrial systems, cyber threat landscape for IoT IIoT is rapidly evolving. Security by Design principles are still widely neglected in design devices protocols. For consumer IoT, privacy applicant can be compromised when inappropriately secured. With r...
The limited computational resources available in RFID tags implied an intensive search for lightweight authentication protocols in the last years. The most promising suggestions were those of the HBfamiliy (HB, HB, TrustedHB, ...) initially introduced by Juels and Weis, which are provably secure (via reduction to the Learning Parity with Noise (LPN) problem) against passive and some kinds of ac...
Network simulators perform well in evaluating the performance of network protocols, but lack the capability of verifying their correctness. In order to address this lacuna, we have extended the J-Sim network simulator with a model checking capability to explore the state space of a network protocol to find either an execution where a safety invariant is violated or an exceution where the satisf...
Network operators control the flow of traffic through their networks by adapting the configuration of the underlying routing protocols. For example, they tune the integer link weights that routing protocols like OSPF use to do distributed forwarding of packets. The resulting optimization problem by the operator—to find the best link weights for a given topology and traffic matrix—is well-known ...
One challenge I face in medicine is how to discuss areas of disagreement with patients. Recently, I had a gentleman come in to discuss some labs ordered by his naturopathic provider. The lab work indicated a disease process not supported by the current medical literature. Yet, he derived not only comfort from the diagnosis but also hope for treatment. He felt better on a treatment regimen that ...
The various routing protocols in Mobile Ad hoc Networks follow different strategies to send the information from one node to another. The nodes in the network are non static and they move randomly and are prone to link failure which makes always to find new routes to the destination. This research mainly focused on the study of the characteristics of multipath routing protocols in MANETS. Two o...
The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote data storage offers reduced data management overhead for data owners in a cost effective manner. Sensitive documents, however, need to be stored in encrypted format due to security concerns. But, encrypted storage makes it difficult to search on the stored documents. Therefore, this poses a major ...
OBJECTIVES To describe the location of treatment, recruitment to clinical trials and outcomes for adolescents and young adults treated for cancer in Victoria. DESIGN AND SETTING Retrospective review of all adolescents and young adults aged 10-24 years diagnosed with cancer between 1992 and 1996, identified from the Victorian Cancer Registry. MAIN OUTCOME MEASURES Treatment regimen (clinical...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید