نتایج جستجو برای: during 2004
تعداد نتایج: 1776978 فیلتر نتایج به سال:
Author’s response to critical essays by Brian Weatherson, Alex Byrne, and Stephen Yablo on Philosophical Analysis in the Twentieth Century, Volume 2
The objective of this study was to characterize the reproduction of Cichla kelberi in an artificial lake, located in the municipality of Leme, in the state of São Paulo, Brazil. Breeding occurred in spring, and summer. The L(50) and the L(100) of this species were 192 and 235 mm (L(50)), for males and females, respectively, and 290 mm (L(100)) for both sexes. Spawning was parceled. The oocytes ...
Purpose: Scabies is a parasitic disease with nocturnal itching and cutaneous lesions. It spreads by physical contact and it occurs mostly in crowded places. Because of their occupation, military personnel have to live in garrisons and camps. So the prevalence of scabies is higher in military systems. Hence, this study evaluated the epidemiology of scabies in Iran’s Army. Materials and...
Frequency of orthodontic malpractice cases and verdicts filed at the Iranian Medical Council during 1994-2004 Dr. Akhoundi, M.S.* - Dr. Kharrazi Fard, M.J.** - Dr. Rahmatian, SH.***- Dr. Chalipa, J.****- Dr. Hosseini MH.**** *Associate Professor of Orthodontics Dept., Faculty of Dentistry, Tehran University / Medical Sciences. **Dentist, Statistical Editor. ***Dentist. *Assistant Professor of ...
Web-based authentication is a popular mechanism implemented by Wireless Internet Service Providers (WISPs) because it allows a simple registration and authentication of customers, while avoiding high resource requirements of the new IEEE 802.11i security standard and backward compatibility issues of legacy devices. In this work we demonstrate two different and novel attacks against web-based au...
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
We consider the Robust Network Design problem, i.e. the problem of dimensioning the capacities on the edges of a graph to serve point-to-point traffic demands subject to uncertainty. The scope of the paper is to investigate when the cut condition is sufficient to guarantee the feasibility for such problem.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید