نتایج جستجو برای: samare 2004
تعداد نتایج: 126302 فیلتر نتایج به سال:
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that simply snoop on the wireless medium successfully defeat the security of even 802.11 networks using the most recent security standards (WPA2-PSK). In this paper we ask the following question: Can we prevent this kind of eavesdropping from happening? If so, we can potentially defeat the entire cla...
The seasonal dynamics of energy (lipid) storage in three neotropical fish species with differing life histories were evaluated. Lipid content was substantially greater in the liver than in dorsal musculature of all three species. Two piscivores (Cichla temensis and Serrasalmus manueli) showed large, statistically significant seasonal fluctuations in liver lipid content. Liver lipid content incr...
1 From the Department of Radiology, Brigham and Women’s Hospital, Harvard Medical School, Boston, Mass (K.H.Z., J.R.F., S.G.S., C.M.C.T.); and Department of Health Care Policy, Harvard Medical School, 180 Longwood Ave, Boston, MA 02115 (K.H.Z.). Received September 10, 2001; revision requested November 8; revision received December 12; accepted December 19. Supported in part by Public Health Ser...
Wireless networking is becoming increasingly prevalent in modern networked environments. This paper examined methods used to secure wireless networks from intrusion and eavesdropping. WEP, WPA and RSN were examined to see the progression from weak to much stronger security for wireless LANs. WEP was incredibly insecure, but these vulnerabilities were addressed to produce significantly more secu...
sequences in molecular phylogenetic trees is consistent with early observations that polychaetes tend to have relatively short branches in such trees, and hence are useful taxa with which to reconstruct gene family evolution. Also it is clear that the traditional molecular model systems for protostomes (e.g. Drosophila melanogaster and Caenorhabditis elegans), which are restricted to the Ecdyso...
With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these fu...
Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and int...
We focus on the question of self-organized scheduling of event detection in SANETs. This question is especially challenging in very dynamic environments. Recently, a number of self-organization methods have been published that focus on network-centric operation in such networks. Based on our previously developed RSN system, which is a light-weight programming scheme for SANETs, we study the fea...
Some gastropod specimens belonging to the planorbid genus Ferrissia were recently collected in Lebanon and in Iraq, where the autochthonous species Ferrissia clessiniana (Jickeli, 1882) is supposed to occur. The molecular identification of collected specimens proved that they belong to the allochthonous species Ferrissia fragilis (Tryon, 1863), the protagonist of a dramatic cryptic invasion whi...
Robust network design refers to a class of optimization problems that occur when designing networks to efficiently handle variable demands. The notion of “hierarchical hubbing” was introduced (in the narrow context of a specific robust network design question), by Olver and Shepherd [14]. Hierarchical hubbing allows for routings with a multiplicity of “hubs” which are connected to the terminals...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید