نتایج جستجو برای: 2004
تعداد نتایج: 126302 فیلتر نتایج به سال:
To create the Pilot, DSHS contracted with the Thurston-Mason Regional Support Network (RSN), which contracted with Behavioral Health Resources (BHR) as the lead agency for implementation. A core team was established, consisting of the RSN, BHR, DSHS Children and Family Services, Mason County Juvenile Court, Community Youth Services, and the University of Washington. The team assessed the needs ...
New species of lance lacewings, Spilosmylus spilopteryxsp. n. and Spilosmylus tephrodestigmasp. n., are described from the Philippines and compared with congeners. Both species are characterised by a distinctive wing pattern, which in the case of Spilosmylus spilopteryxsp. n. is relatively spectacular among lacewings. An identification key to the species of Spilosmylus Kolbe known from the Phil...
Wireless networks are commonly used by people. Market devices are equipped with the new security standard 802.11i. The standard announced in the middle of 2004 is commonly used to protect WLANs. Currently we can find the information that vulnerabilities were found in that standard. Then a question arises: Are WLANs compromised again? The article describes vulnerabilities which were discovered i...
Iolanthe Beddard, 1886a is shown to be a senior synonyn of Acanthaspidia Stebbing, 1893, the replacement name for the preoccupied Acanthoniscus Sars, 1879 (Isopoda: Asellota: Acanthaspidiidae). Ischnomesus kussakini nom. nov. is erected as a replacement name for Ischnomesus antarcticus (Kussakin, 1982), preoccupied in this combination (Isopoda: Asellota: Ischnomesidae).
The Aleiodes melanopterus (Erichson, 1848) species-group includes 21 species, of which seven are known from the Neotropical region: Aleiodes flavistigma Shaw, 1993, Aleiodes lucidus (Szépligeti, 1906), Aleiodes melanopterus, Aleiodes mexicanus Cresson, 1869, Aleiodes politiceps (Gahan, 1917), and the new species Aleiodes shaworumsp. n. and Aleiodes vassunungasp. n. Distribution ranges of Aleiod...
Author’s response to critical essays by Brian Weatherson, Alex Byrne, and Stephen Yablo on Philosophical Analysis in the Twentieth Century, Volume 2
The objective of this study was to characterize the reproduction of Cichla kelberi in an artificial lake, located in the municipality of Leme, in the state of São Paulo, Brazil. Breeding occurred in spring, and summer. The L(50) and the L(100) of this species were 192 and 235 mm (L(50)), for males and females, respectively, and 290 mm (L(100)) for both sexes. Spawning was parceled. The oocytes ...
Web-based authentication is a popular mechanism implemented by Wireless Internet Service Providers (WISPs) because it allows a simple registration and authentication of customers, while avoiding high resource requirements of the new IEEE 802.11i security standard and backward compatibility issues of legacy devices. In this work we demonstrate two different and novel attacks against web-based au...
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
We consider the Robust Network Design problem, i.e. the problem of dimensioning the capacities on the edges of a graph to serve point-to-point traffic demands subject to uncertainty. The scope of the paper is to investigate when the cut condition is sufficient to guarantee the feasibility for such problem.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید