نتایج جستجو برای: hoc tests

تعداد نتایج: 383823  

Journal: :Journal of Functional Programming 2013

پایان نامه :0 1392

nowadays in trade and economic issues, prediction is proposed as the most important branch of science. existence of effective variables, caused various sectors of the economic and business executives to prefer having mechanisms which can be used in their decisions. in recent years, several advances have led to various challenges in the science of forecasting. economical managers in various fi...

Journal: :Extensão em Foco 2020

Journal: :Estudos e Pesquisas em Psicologia 2018

2009
Konstantinos Papapanagiotou

This thesis studies trust establishment in wireless, ad hoc networks. ADOPT is presented, a complete scheme for certificate validation in wireless, ad hoc networks. Its architecture is based on a distributed version of OCSP and more specifically on OCSP response caching in carefully selected nodes of the network. The method for locating cached OCSP response is thoroughly analyzed, along with te...

Journal: :Intelligent Automation & Soft Computing 2011
Lizhong Xu Xiaofang Li Simon X. Yang

The topics of this special issue are mainly devoted to the most recent research, development and applications in the field of wireless ad-hoc networks, multimedia networks, communication signal processing. Among all the submitted manuscripts, 15 papers were selected and included in this special. Creative thoughts and interesting inspirations will be presented, discussed and disseminated in this...

Journal: :Security and Communication Networks 2013
Tao Gong Bharat K. Bhargava

In this paper, a security problem of cooperative immunization against collaborative attacks such as blackhole attacks and wormhole attacks, in the mobile ad hoc networks such as theWorldwide Interoperability forMicrowave Access (WiMAX) networks, was discussed. Because of the vulnerabilities of the protocol suites, collaborative attacks in the mobile ad hoc networks can cause more damages than i...

2004
Murat Cihan Çetin Kaya Koç

Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols for creating session and group keys, once a subset of individual nodes are signed in, i.e., established their shared secret keys. In this paper, we address the issue of setting initial secret ...

2007
Morten N. Jensen Anders Nickelsen Erling V. Matthiesen Hans-Peter Schwefel

Enclosed CD-ROM contains source code and downloaded references. Synopsis: Performing experimental evaluation of wireless networking is prone to large differences between experiments as the non-deterministic nature of the environment may influence the results differently between tests. This fact has motivated the work described in this report, which constitutes the development and deployment of ...

Journal: :Revista Letras Raras 2022

Colaboradores ad hoc

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید