نتایج جستجو برای: identification with place
تعداد نتایج: 9432219 فیلتر نتایج به سال:
802.11 networks are largely adopted, thus the identification of wireless devices becomes a major issue in network security. This study takes place in the scope of a defensive scenario, and can be used to detect Medium Access Control (MAC) address spoofing. We develop an approach to improve the identification of unique devices while keeping existing 802.11 fingerprinting methods. We evaluate our...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
Cross-language differences in the use of coarticulatory cues for the identification of fricatives have been demonstrated in a phoneme detection task: Listeners with perceptually similar fricative pairs in their native phoneme inventories (English, Polish, Spanish) relied more on cues from vowels than listeners with perceptually more distinct fricative contrasts (Dutch and German). The present g...
Pitch perception is determined by both place and temporal cues. To explore whether the manner in which these cues are used differs depending on absolute pitch capability, pitch identification experiments with and without pitch references were conducted for subjects with different absolute pitch capabilities and musical experience. Three types of stimuli were used to manipulate place and tempora...
With recent advances in radio-frequency identification (RFID), wireless sensor networks, and Web services, physical things are becoming an integral part of the emerging ubiquitous Web. Finding correlations of ubiquitous things is a crucial prerequisite for many important applications such as things search, discovery, classification, recommendation, and composition. This article presents DisCor-...
We consider a process during which encoded messages are processed through a network; at one step a message can be delivered only to a neighbor of the current node; at each node a message is recoded cryptographically so that an external observer cannot link the messages before and after re-coding. The goal of re-coding is to hide origins of the messages from an adversary who monitors the traffic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید