نتایج جستجو برای: protected

تعداد نتایج: 55122  

Journal: :Annales UMCS, Informatica 2006
Ryszard Haraszczuk

Wireless networks are commonly used by people. Market devices are equipped with the new security standard 802.11i. The standard announced in the middle of 2004 is commonly used to protect WLANs. Currently we can find the information that vulnerabilities were found in that standard. Then a question arises: Are WLANs compromised again? The article describes vulnerabilities which were discovered i...

2017
Rūdolfs Kalniņš Jānis Puriņš Gundars Alksnis

The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the aver...

Journal: :journal of rangeland science 2014
negin nodehi mousa akbarlou adel sepehry hasan vahid

abstract. the purpose of this study was to investigate the effects of topographical factors on the classification of grassland plant communities in the rangelands of ghorkhud, northern khorasan province, iran. for sampling, land units were specified. a floristic list was prepared using minimal area method based on the nested plot (braun-blanquet method). 116 10m2 furrows were selected. within e...

2007
Charles Lidz

Research on coercion in research contexts is almost unknown. Much of the difficulty is conceptual and methodological. We do not have general agreement on what should be counted as coercive in a research context and how it should be measured. This paper will review the limited data on the subject and the methodologies and findings that have been used in clinical contexts. These methodologies, wh...

2014
Milos Stanojevic Khalil Sima'an

We present the UvA-ILLC submission of the BEER metric to WMT 14 metrics task. BEER is a sentence level metric that can incorporate a large number of features combined in a linear model. Novel contributions are (1) efficient tuning of a large number of features for maximizing correlation with human system ranking, and (2) novel features that give smoother sentence level scores.

2003
Virginie Ravigné

In this paper we reexamine how heterogeneous environments can enable protected polymorphisms. Building on the classical models by Levene and Dempster of dispersal and selection in two habitats, we systematically investigate how the maintenance of polymorphisms is affected by (i) local versus global density regulation and (ii) constant versus variable output from habitats to the next generation....

2017
Mehmet Kayaalp

De-identification of protected health information is an essential method for protecting patient privacy. Most institutes require de-identification of patient data prior to conducting scientific studies; therefore, it is important for clinical scientists to be cognizant of all modes of de-identification and all services provided by their de-identification tools. In this article, we discuss eight...

2005
Steve Goldberg Nilmini Wickramasinghe

Medical science has made revolutionary changes in the past decades. Contemporaneously however, healthcare has made incremental changes at best. The growing discrepancy between the revolutionary changes in medicine and the minimal changes in healthcare processes is leading to inefficient and ineffective healthcare deliver and one if not the significant contributor to the exponentially increasing...

Journal: :IACR Cryptology ePrint Archive 2013
Sourav Sengupta Subhamoy Maitra Willi Meier

We present an efficient algorithm that can distinguish the keystream of WPA from that of a generic instance of RC4 with a packet complexity of O(N), where N denotes the size of the internal permutation of RC4. In practice, our distinguisher requires approximately 2 packets; thus making it the best known distinguisher of WPA to date. This is a significantly improved distinguisher than the previo...

1996
M. Gabriel F. Carlier

We have introduced hydrogen diffusion in our evolution code in such a way that the chemical composition is computed taking simultaneously into account diffusion and nuclear reactions. The first model was obtained with the diffusion coefficients given by Thoul et al.(1995). Its frequencies show that the model should be improved. Five other models been have obtained with modifications of the diff...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید