نتایج جستجو برای: farzad 2004

تعداد نتایج: 126361  

Journal: :Comput. Sci. Inf. Syst. 2006
Radomir Prodanovic Dejan Simic

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...

Journal: :Electronic Notes in Discrete Mathematics 2013
Sara Mattia

We consider the Robust Network Design problem, i.e. the problem of dimensioning the capacities on the edges of a graph to serve point-to-point traffic demands subject to uncertainty. The scope of the paper is to investigate when the cut condition is sufficient to guarantee the feasibility for such problem.

2009
Farzad Talebi

Farzad Talebi Abstract As an inevitable phenomenon in wireless networks, interference has been always an important concern in designing communication networks. There are some conventional interference management approaches which will be mentioned here. The important note about all these approaches is that using them, the sum-capacity of the network will be limited by interference, regardless of...

2012
Farzad Hatami Neda Esmaeili

One of the most important assumptions which is being used in analysis and design of buildings against lateral forces is the rigid-floor assumption. Lateral rigidity of diaphragms depends on several factors such as: type of the structure, dimensions of structure, rigidity and location of lateral load bearing elements, stiffness of frames, type and thickness of floors, number of stories and etc. ...

2006
J. Barrie Thompson Timothy Lethbridge

We outline the ACM/IEEE-CS sponsored Computing Curricula project, and then discuss the context and development of its Software Engineering Volume (SE2004).. We then discuss evaluation of the volume, internationalization, the relationship with other disciplines, and the importance of the document’s future evolution.

2007
Jen-Jee Chen Yu-Chee Tseng Hung-Wei Lee

IEEE 802.11 wireless networks have gained great popularity. However, handoff is always a critical issue in this area. In this paper, we propose a novel seamless handoff mechanism for IEEE 802.11 wireless networks which support IEEE 802.11i security standard. Our approach consists of a Dynamic Tunnel Establishing procedure and a seamless handoff mechanism. Dynamic Tunnel Establishing is for each...

Journal: :Math. Program. 2016
Valentina Cacchiani Michael Jünger Frauke Liers Andrea Lodi Daniel R. Schmidt

1DEI, University of Bologna, Viale Risorgimento 2, I-40136, Bologna, Italy, {valentina.cacchiani,andrea.lodi}@unibo.it 2Institut für Informatik, Universität zu Köln, Albertus-Magnus-Platz, 50923 Köln, Germany, {mjuenger,schmidt}@informatik.uni-koeln.de 3Department Mathematik, Friedrich-Alexander Universität Erlangen-Nürnberg, Cauerstraße 11, 91058 Erlangen, Germany, [email protected]...

Journal: :CIT 2007
Radomir Prodanovic Dejan Simic

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...

Journal: :Zootaxa 2015
Cuong Huynh Anneke A Veenstra

A new species of penicillate millipede, from genus Monographis (Diplopoda: Polyxenidae), was collected from Trang Bom and Dinh Quan, within the Dong Nai province, southern Vietnam. Taxonomic characteristics of the genus Monographis Attems, 1907, were used to formally describe this new species. Sensilla of the 6th antennal article and claw structures of Monographis dongnaiensis were c...

Journal: :Annales UMCS, Informatica 2006
Ryszard Haraszczuk

Wireless networks are commonly used by people. Market devices are equipped with the new security standard 802.11i. The standard announced in the middle of 2004 is commonly used to protect WLANs. Currently we can find the information that vulnerabilities were found in that standard. Then a question arises: Are WLANs compromised again? The article describes vulnerabilities which were discovered i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید