نتایج جستجو برای: 2004 from karoun
تعداد نتایج: 5652110 فیلتر نتایج به سال:
during the process of reading, sometimes learners use ineffective and inefficient strategies and some factors may influence their use of strategies. perhaps critical thinking is one of these factors. this study aims to identify those categories of reading strategies that are mostly used by iranian efl learners and to see if there is any significant relationship between the critical thinking abi...
Web-based authentication is a popular mechanism implemented by Wireless Internet Service Providers (WISPs) because it allows a simple registration and authentication of customers, while avoiding high resource requirements of the new IEEE 802.11i security standard and backward compatibility issues of legacy devices. In this work we demonstrate two different and novel attacks against web-based au...
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
We consider the Robust Network Design problem, i.e. the problem of dimensioning the capacities on the edges of a graph to serve point-to-point traffic demands subject to uncertainty. The scope of the paper is to investigate when the cut condition is sufficient to guarantee the feasibility for such problem.
We outline the ACM/IEEE-CS sponsored Computing Curricula project, and then discuss the context and development of its Software Engineering Volume (SE2004).. We then discuss evaluation of the volume, internationalization, the relationship with other disciplines, and the importance of the document’s future evolution.
IEEE 802.11 wireless networks have gained great popularity. However, handoff is always a critical issue in this area. In this paper, we propose a novel seamless handoff mechanism for IEEE 802.11 wireless networks which support IEEE 802.11i security standard. Our approach consists of a Dynamic Tunnel Establishing procedure and a seamless handoff mechanism. Dynamic Tunnel Establishing is for each...
1DEI, University of Bologna, Viale Risorgimento 2, I-40136, Bologna, Italy, {valentina.cacchiani,andrea.lodi}@unibo.it 2Institut für Informatik, Universität zu Köln, Albertus-Magnus-Platz, 50923 Köln, Germany, {mjuenger,schmidt}@informatik.uni-koeln.de 3Department Mathematik, Friedrich-Alexander Universität Erlangen-Nürnberg, Cauerstraße 11, 91058 Erlangen, Germany, [email protected]...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید