نتایج جستجو برای: carrying method

تعداد نتایج: 1681689  

2005
M. Parthasarathy

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document discusses the threats to protocols used to carry authentication for network access. The security requirements arising from these threats will be used as additional input to the Protocol for Carrying Au...

2006
Simon Winwood Gerwin Klein Manuel M. T. Chakravarty

We extend the range of security policies that can be guaranteed with proof carrying code from the classical type safety, control safety, memory safety, and space/time guarantees to more general security policies, such as general resource and access control. We do so by means of (1) a specification logic for security policies, which is the pasttime fragment of LTL, and (2) a synthesis algorithm ...

Journal: :IJORIS 2011
R. P. Tripathi

In this paper the authors consider the continuous deterministic, infinite horizon, single item inventory system within the setting of a retailer sector in which the demand rate for an item is time dependent. The parameter of the replenishment cost is kept constant, but the carrying cost per unit is allowed to vary. The optimal policies are found, and decision rules and classical EOQ model have ...

2008
P. Jayaraman R. Lopez

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document defines the general Protocol for Carrying Authentication for Network Access (PANA) framework functional elements, high-level call flow, and deployment environments.

2010
A. Yegin

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

2016
Sönke Holthusen Michael Nieke Thomas Thüm Ina Schaefer

For extensible software platforms in safety-critical domains, it is important that deployed plug-ins work as specified. This is especially true with the prospect of allowing third parties to add plug-ins. We propose a contract-based approach for deployment-time verification. Every plug-in guarantees its functional behavior under a specific set of assumptions towards its environment. With proof-...

2003
Paulo S. Pagliusi Chris J. Mitchell

Currently there are no Internet access authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/GSM authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PA...

Journal: :RFC 2011
Paul Duffy Samita Chakrabarti Robert Cragie Yoshihiro Ohba Alper E. Yegin

This document specifies Protocol for carrying Authentication for Network Access (PANA) Relay Element functionality, which enables PANA messaging between a PANA Client (PaC) and a PANA Authentication Agent (PAA) where the two nodes cannot reach each other by means of regular IP routing. Information about the current status of this document, any errata, and how to provide feedback on it may be ob...

2004
Martin Wildmoser Tobias Nipkow Gerwin Klein Sebastian Nanz

We introduce a generic framework for proof carrying code, developed and mechanically verified in Isabelle/HOL. The framework defines and proves sound a verification condition generator with minimal assumptions on the underlying programming language, safety policy, and safety logic. We demonstrate its usability for prototyping proof carrying code systems by instantiating it to a simple assembly ...

Journal: :JCP 2014
Xiuxia Yang Yi Zhang Jianhong Shi Xiaowei Liu

At present, most of the control methods of the lower extremity exoskeleton carrying robot require to calculate the system’s dynamic equation and create the control quantity at each moment, which don’t make full use of the repeatability feature of human movement and inevitably causes the delay on the dynamic response of the system. In this paper, utilizing the dynamic repeat characteristics of h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید