نتایج جستجو برای: search protocols
تعداد نتایج: 391475 فیلتر نتایج به سال:
In RFID-assisted applications, the customers often request to provide tag searching service determine which specific tags are present in system. practice, usually divided into different groups represent categories or brands. We found that traditional protocols not very appropriate for multi-group RFID scenarios because they cannot ensure results of each group satisfy predefined reliability requ...
when emerging technologies such as search engine marketing (sem) face tasks that require human level intelligence, it is inevitable to use the knowledge repositories to endow the machine with the breadth of knowledge available to humans. keyword suggestion for search engine advertising is an important problem for sponsored search and sem that requires a goldmine repository of knowledge. a recen...
Introduction Early mobilisation protocols after repair of extensor tendons in zone V and VI provide better outcomes than immobilisation protocols. This systematic review investigated different early active mobilisation protocols used after extensor tendon repair in zone V and VI. The purpose was to determine whether any one early active mobilisation protocol provides superior results. Methods...
Wireless Sensor Networks (WSNs), which is a system of nodes connected by wireless links, is a very popular area for exploration. The nodes are free to move around and organize themselves into a network. The network topology is often changing, and for relatively smaller networks, the flat routing schemes are sufficient. However in larger networks, either geographical or hierarchical routing prot...
We develop a systematic proof procedure for establishing secrecy results for cryptographic protocols. Part of the procedure is to reduce messages to simplified constituents, and its core is a search procedure for establishing secrecy results. This procedure is sound but incomplete in that it may fail to establish secrecy for some secure protocols. However, it is amenable to mechanization, and i...
The emerging Future Internet will bring a number of new challenges due to the inclusion of an enormous amount of distributed heterogenous mobile devices such as wireless sensor networks, mobile phones, and other sensor equipped embedded systems. Key challenges will be energy efficiency of protocols and algorithms due to the scarce resources of the used devices, the real-time search for real-wor...
A cyber security strategy for Industrial Control Systems (ICS) is typically based on the identified threats to a system. In order to obtain a better insight into the ICS-related threat landscape, we have deployed a largescale, low-interaction honeypot system on the Internet and have analysed the interactions observed during 28-day long experiments. We describe the interaction results for a vari...
We present a search method for detecting potential security aws in cryptographic protocols. The method can nd aws which are inherent in the design of the protocol as well as aws arising from the particular implementation of the protocol. The latter possibility arises from the fact that there is no universally accepted standard for describing either the cryptographic protocols themselves or thei...
A logic for reasoning about quantum circuits and protocols is proposed. It incorporates the basic features of quantum theoryprobability, unitary dynamics, tensor products and measurement. The underlying language could be used for verification and synthesis of quantum circuits. Important algorithms like the quantum search algorithm of Grover are discussed. The logic also forms the foundation on ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید