نتایج جستجو برای: search protocols

تعداد نتایج: 391475  

Journal: :iranian red crescent medical journal 0
anvar esmaili department of health management and economics, school of public health, tehran university of medical sciences, tehran, ir iran hamid ravaghi department of health services management, school of health management and information sciences, iran university of medical sciences, tehran, ir iran; department of health service management, school of health management and information sciences, iran university of medical sciences, tehran, ir iran. tel: +98-2188793805 hesam seyedin health management and economics research centre, iran university of medical sciences, tehran, ir iran bahram delgoshaei department of health services management, school of health management and information sciences, iran university of medical sciences, tehran, ir iran masoud salehi health management and economics research centre, iran university of medical sciences, tehran, ir iran

conclusions the results illustrate that the iranian version of the aep (ir-aep) could be a reliable and valid instrument for assessing the level of inappropriate acute hospital admissions and days of care in the iranian context. results inter-rater and intra-rater reliability testing revealed an excellent level of consensus between the two nurses employing the aep in all the studied departments...

Journal: :Wireless Networks 2011
Stephen Dabideen J. J. Garcia-Luna-Aceves

A new approach for routing protocols operating in MANETs is presented in which flooding is not required to establish paths from sources to destinations on demand in MANETs of moderate size. The concept of ordered walk is introduced as a depth-first search (DFS) that does not rely on geographical or virtual coordinate information and is much more efficient than mere random walks. The benefits of...

1996
Joshua Lubell

The Application Protocol Information Base (APIB) is an on-line repository of documents for the Standard for the Exchange of Product model data (STEP, officially ISO 10303—Product Data Representation and Exchange). Document types in the APIB include STEP Application Protocols and Integrated Resources. Application Protocols are standards that are intended to be implemented in software systems, an...

2014
Joshua Sunshine James D. Herbsleb Jonathan Aldrich

Application Programming Interfaces (APIs) often define object protocols. Objects with protocols have a finite number of states and in each state a different set of method calls is valid. Many researchers have developed protocol verification tools because protocols are notoriously difficult to follow correctly. However, recent research suggests that a major challenge for API protocol programmers...

2017
Sergiu Bursuc Christian Johansen Shiwei Xu

Automated verification of security protocols based on dynamic root of trust, typically relying on protected hardware such as TPM, involves several challenges that we address in this paper. We model the semantics of trusted computing platforms (including CPU, TPM, OS, and other essential components) and of associated protocols in a classical process calculus accepted by ProVerif. As part of the ...

Journal: :IACR Cryptology ePrint Archive 2010
José Carrijo Rafael Tonicelli Anderson C. A. Nascimento

The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them....

2017
Eike Kiltz Julian Loss Jiaxin Pan

We carry out a concrete security analysis of signature schemes obtained from five-move identification protocols via the Fiat-Shamir transform. Concretely, we obtain tightly-secure signatures based on the computational Diffie-Hellman (CDH), the short-exponent CDH, and the Factoring (FAC) assumptions. All our signature schemes have tight reductions to search problems, which is in stark contrast t...

2003
Stefan Edelkamp

In this paper a compiler from a restricted subset of SPIN’s input language Promela into an action planning description language is presented. It exploits the representation of protocols as communicating finite state machines. The work targets the transfer between the state space exploration areas AI planning and model checking by making protocols accessible for action planners. It provides a pr...

Journal: :J. Intelligent Manufacturing 2014
Imran Erguler Emin Anarim Gökay Saldamli

Designingprivacypreserving authenticationprotocols for massively deployed Radio Frequency IDentification (RFID) systems is a real world challenge that have drawn significant attention from RFID community. This interest yields considerable amount of proposals targeting to overcome the main bottleneck (i.e. the exhaustive search over the list of all tag entries) which appears in the back-end data...

2002
Damien Magoni Jean-Jacques Pansiot

Many protocols and applications need a discovery mechanism to enable a given client node to locate one or several specific nodes involved in the same communication. However, there is no protocol ready to fulfill this service at the network layer. Every protocol usually implements its own solution. In particular, multicast protocols often use a search technique called expanding ring search. This...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید