نتایج جستجو برای: 2004 from karoun

تعداد نتایج: 5652110  

2003
Julia R. Fielding Clare M. C. Tempany

1 From the Department of Radiology, Brigham and Women’s Hospital, Harvard Medical School, Boston, Mass (K.H.Z., J.R.F., S.G.S., C.M.C.T.); and Department of Health Care Policy, Harvard Medical School, 180 Longwood Ave, Boston, MA 02115 (K.H.Z.). Received September 10, 2001; revision requested November 8; revision received December 12; accepted December 19. Supported in part by Public Health Ser...

2011
Liam Kiemele

Wireless networking is becoming increasingly prevalent in modern networked environments. This paper examined methods used to secure wireless networks from intrusion and eavesdropping. WEP, WPA and RSN were examined to see the progression from weak to much stronger security for wireless LANs. WEP was incredibly insecure, but these vulnerabilities were addressed to produce significantly more secu...

Journal: :Mechanisms of Development 2009
Kimberly Cooper Shaoyuan Wu Fuchun Zhang Farish Jenkins

sequences in molecular phylogenetic trees is consistent with early observations that polychaetes tend to have relatively short branches in such trees, and hence are useful taxa with which to reconstruct gene family evolution. Also it is clear that the traditional molecular model systems for protostomes (e.g. Drosophila melanogaster and Caenorhabditis elegans), which are restricted to the Ecdyso...

2006
Jin-Cherng Lin Yu-Hsin Kao

With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these fu...

2004
Nidal Aboudagga Damien Giry Jean-Jacques Quisquater

Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and int...

2008
Falko Dressler

We focus on the question of self-organized scheduling of event detection in SANETs. This question is especially challenging in very dynamic environments. Recently, a number of self-organization methods have been published that focus on network-centric operation in such networks. Based on our previously developed RSN system, which is a light-weight programming scheme for SANETs, we study the fea...

2014
Federico Marrone Murtada D. Naser Amaal Gh. Yasser Francesco Sacco Marco Arculeo

Some gastropod specimens belonging to the planorbid genus Ferrissia were recently collected in Lebanon and in Iraq, where the autochthonous species Ferrissia clessiniana (Jickeli, 1882) is supposed to occur. The molecular identification of collected specimens proved that they belong to the allochthonous species Ferrissia fragilis (Tryon, 1863), the protagonist of a dramatic cryptic invasion whi...

Journal: :Oper. Res. Lett. 2016
Neil Olver

Robust network design refers to a class of optimization problems that occur when designing networks to efficiently handle variable demands. The notion of “hierarchical hubbing” was introduced (in the narrow context of a specific robust network design question), by Olver and Shepherd [14]. Hierarchical hubbing allows for routings with a multiplicity of “hubs” which are connected to the terminals...

2009
Chunfeng Yuan Xi Li Weiming Hu Hanzi Wang

The bag-of-visual-words (BOVW) approaches are widely used in human action recognition. Usually, large vocabulary size of the BOVW is more discriminative for inter-class action classification while small one is more robust to noise and thus tolerant to the intra-class invariance. In this pape, we propose a pyramid vocabulary tree to model local spatio-temporal features, which can characterize th...

2009
Anjum Naveed Salil Kanhere

The security services of authentication and confidentiality are of significant importance to ensure secure communication in any network. The decentralized nature and the broadcast medium of communication of wireless ad hoc networks results in unique challenges in realizing the services of authentication and data confidentiality. In this chapter, We first highlight the issues relating to authent...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید