نتایج جستجو برای: misbehavior
تعداد نتایج: 965 فیلتر نتایج به سال:
Mechanisms to Tolerate Misbehavior in Replicated Systems
Nodes that build a mobile ad-hoc network participate in a common routing protocol in order to provide multi-hop radio communication. Routing defines how control information is exchanged between nodes in order to find the paths between communication pairs, and how data packets are relayed. Such networks are vulnerable to routing misbehavior, due to faulty, selfish or malicious nodes. Misbehavior...
This study examined the seriousness with which agriculture teachers view the misbehavior of students enrolled in their agriculture programs today and sought to determine if the level of seriousness of student misbehavior in agricultural education has changed over time. The participants in the study were 165 agricultural education teachers in North Carolina, South Carolina, and Virginia. These t...
A professional development program which trained whole school staffs in the use of positive behavioral interventions for the purpose of reducing referral rates of students for misbehavior and special education evaluation. The program focused on training teachers and paraprofessionals in behavior management strategies to increase “high approval teaching,” to develop structured and organized clas...
Nodes using contention-based CSMA protocols are susceptible to the misbehavior of other nodes and also have little flexibility in controlling quality of service. To address the misbehavior problem, continuous-time protocols are proposed. The effects of “misbehavior” on the QoS of all nodes in the system caused by changing the cheater’s arrival rate and backoff rate are studied. The problem of f...
Introduction: Elder abuse is a major public health concern worldwide. Considering the high prevalence of misbehavior towards the elderly, this study investigated the prevalence of elder abuse and its related factors among the elderly people in Yasouj, Iran in 2021. Methods: Using a convenience sampling method, this cross-sectional study included 299 older adults aged over 60 years referring ...
ABSTRACT Congestion ontrol proto ols rely on re eivers to support fair bandwidth sharing. However, a re eiver has in entives to eli it self-bene ial bandwidth allo ations and hen e may manipulate its ongestion ontrol proto ol. Whereas the issue of re eiver misbehavior has been studied for uni ast ongestion ontrol, the impa t of re eiver misbehavior in multi ast remains unexplored. In this paper...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for access to the channel to wait for a “backoff” interval, randomly ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید