نتایج جستجو برای: matsui 2004

تعداد نتایج: 126647  

Journal: :Journal of the Intensive Care Society 2004

Journal: :Nucleic Acids Research 2004

Journal: :Zootaxa 2013
Paweł Jałoszyński

The last two years brought surprising descriptions and nomenclatural changes in the tribe Scydmaenini of the ant-like stone beetles. Makhan & Ezzatpanah (2011) established a new genus Roepnarainius, clearly based on a misinterpretation of morphological characters. Another curious taxonomic decision was the placement by Tronquet (2012) of Scydmaenus perrisi Reitter, 1882 as a junior synonym of S...

2014
Rafal Baranowski

clock .. . . . primary data/control inputs .. parallel scan data input primary data outputs Figure 4.7.: CSU-accurate FSM representation of a reconfigurable scan network a full CSU operation, i.e., multiple clock cycles in the cycle-accurate RSN model. An example is given in Figure 4.6 where k cycles of a CSU operation are combined into a single transition in the CAM. The block diagram of a CSU...

2011
Michael Poss Christian Raack

Affinely-Adjustable Robust Counterparts provide tractable alternatives to (two-stage) robust programs with arbitrary recourse. We apply them to robust network design with polyhedral demand uncertainty, introducing the affine routing principle. We compare the affine routing to the well-studied static and dynamic routing schemes for robust network design. All three schemes are embedded into the g...

Journal: :IJICS 2007
Khidir M. Ali Thomas J. Owens

IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to ...

2009
Martin Eian

The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two other DoS vulnerabilities: one vulnerability in draft 802.11w implementations discovered by IEEE 802.11 TGw, and one new vulnerability in 802.11, which is still present in the 802.11w amendment. Attacks exploiting the fi...

2014
Nick Meader Kristel King Alexis Llewellyn Jennifer Brown Mark Rodgers Thirimon Moe-Byrne Julian PT Higgins Amanda Sowden Gavin Stewart Gill Norman Julian Higgins

Nick Meader ([email protected]) Kristel King ([email protected]) Alexis Llewellyn ([email protected]) Gill Norman ([email protected]) Jennifer Brown ([email protected]) Mark Rodgers ([email protected]) Thirimon Moe-Byrne ([email protected]) Julian PT Higgins ([email protected]) Amanda Sowden ([email protected]) Gavin Stewart (gavin.stewa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید