نتایج جستجو برای: 2004 snieder 2004 bensen et al2007
تعداد نتایج: 597715 فیلتر نتایج به سال:
clock .. . . . primary data/control inputs .. parallel scan data input primary data outputs Figure 4.7.: CSU-accurate FSM representation of a reconfigurable scan network a full CSU operation, i.e., multiple clock cycles in the cycle-accurate RSN model. An example is given in Figure 4.6 where k cycles of a CSU operation are combined into a single transition in the CAM. The block diagram of a CSU...
Affinely-Adjustable Robust Counterparts provide tractable alternatives to (two-stage) robust programs with arbitrary recourse. We apply them to robust network design with polyhedral demand uncertainty, introducing the affine routing principle. We compare the affine routing to the well-studied static and dynamic routing schemes for robust network design. All three schemes are embedded into the g...
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to ...
The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two other DoS vulnerabilities: one vulnerability in draft 802.11w implementations discovered by IEEE 802.11 TGw, and one new vulnerability in 802.11, which is still present in the 802.11w amendment. Attacks exploiting the fi...
Nick Meader ([email protected]) Kristel King ([email protected]) Alexis Llewellyn ([email protected]) Gill Norman ([email protected]) Jennifer Brown ([email protected]) Mark Rodgers ([email protected]) Thirimon Moe-Byrne ([email protected]) Julian PT Higgins ([email protected]) Amanda Sowden ([email protected]) Gavin Stewart (gavin.stewa...
The language of radiology is rich with descriptions of imaging findings, often metaphorical, which have found common usage in the day-to-day practice of genitourinary radiology. These “classic signs” give us confidence in our diagnosis. Some of the signs have become so familiar to us that they are referred to as an “Aunt Minnie.” When the sign is invoked, or an Aunt Minnie is recognized, it oft...
The Software Engineering Volume is part of the IEEE-CS/ACM Computing Curriculum effort that began in the Fall of 1998 when individuals from the IEEE Computer Society and the ACM formed a Steering Committee and began work on the Computer Science Volume. This Steering Committee came to the conclusion that the area of computing had gone beyond the boundaries of computer science and that one volume...
How to efficiently map the nodes and links in a given virtual network (VN) to those in the substrate network (SN) so that the residual substrate network (RSN) can host as many VN requests as possible is a major challenge in virtual network embedding. Most research has developed heuristic algorithms with interactive or two-stage methods. These methods, however, could cause the RSN fragmented int...
The present study deals with the ecological impacts of the introduction of two alien species of piscivorous fish in several lakes of the Middle Rio Doce lake district in Minas Gerais, Brazil. It was demonstrated that these effects were not restricted only to the fish community. The introduction of the predatory red piranha Pygocentrus nattereri and the tucunaré Cichla cf. ocellaris caused not o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید