نتایج جستجو برای: search protocols

تعداد نتایج: 391475  

Journal: :Applied sciences 2023

In RFID-assisted applications, the customers often request to provide tag searching service determine which specific tags are present in system. practice, usually divided into different groups represent categories or brands. We found that traditional protocols not very appropriate for multi-group RFID scenarios because they cannot ensure results of each group satisfy predefined reliability requ...

Journal: :journal of computer and robotics 0
amir h. jadidinejad faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran fariborz mahmoudi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

when emerging technologies such as search engine marketing (sem) face tasks that require human level intelligence, it is inevitable to use the knowledge repositories to endow the machine with the breadth of knowledge available to humans. keyword suggestion for search engine advertising is an important problem for sponsored search and sem that requires a goldmine repository of knowledge. a recen...

2018
Shirley Jf Collocott Edel Kelly Richard F Ellis

Introduction Early mobilisation protocols after repair of extensor tendons in zone V and VI provide better outcomes than immobilisation protocols. This systematic review investigated different early active mobilisation protocols used after extensor tendon repair in zone V and VI. The purpose was to determine whether any one early active mobilisation protocol provides superior results. Methods...

2015
S. Kavitha B. Vanaja

Wireless Sensor Networks (WSNs), which is a system of nodes connected by wireless links, is a very popular area for exploration. The nodes are free to move around and organize themselves into a network. The network topology is often changing, and for relatively smaller networks, the flat routing schemes are sufficient. However in larger networks, either geographical or hierarchical routing prot...

2001
Véronique Cortier Jonathan K. Millen Harald Ruess

We develop a systematic proof procedure for establishing secrecy results for cryptographic protocols. Part of the procedure is to reduce messages to simplified constituents, and its core is a search procedure for establishing secrecy results. This procedure is sound but incomplete in that it may fail to establish secrecy for some secure protocols. However, it is amenable to mechanization, and i...

2010
D. Bimschas S. Fekete S. Fischer M. Güneş O. Hahm H. Hellbrück A. Kröller R. Mietz M. Pagel D. Pfisterer K. Römer K. Schleiser T. Teubler

The emerging Future Internet will bring a number of new challenges due to the inclusion of an enormous amount of distributed heterogenous mobile devices such as wireless sensor networks, mobile phones, and other sensor equipped embedded systems. Key challenges will be energy efficiency of protocols and algorithms due to the scarce resources of the used devices, the real-time search for real-wor...

2015
Alexandru Vlad Serbanescu Sebastian Obermeier Der-Yeuan Yu

A cyber security strategy for Industrial Control Systems (ICS) is typically based on the identified threats to a system. In order to obtain a better insight into the ICS-related threat landscape, we have deployed a largescale, low-interaction honeypot system on the Internet and have analysed the interactions observed during 28-day long experiments. We describe the interaction results for a vari...

1998
Sigrid Gürgens René Peralta

We present a search method for detecting potential security aws in cryptographic protocols. The method can nd aws which are inherent in the design of the protocol as well as aws arising from the particular implementation of the protocol. The latter possibility arises from the fact that there is no universally accepted standard for describing either the cryptographic protocols themselves or thei...

2005
Manas K. Patra

A logic for reasoning about quantum circuits and protocols is proposed. It incorporates the basic features of quantum theoryprobability, unitary dynamics, tensor products and measurement. The underlying language could be used for verification and synthesis of quantum circuits. Important algorithms like the quantum search algorithm of Grover are discussed. The logic also forms the foundation on ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید