نتایج جستجو برای: memory protocol
تعداد نتایج: 500200 فیلتر نتایج به سال:
We present a self stabilizing token circulation protocol on unidirectional anonymous rings This protocol does not required processor identi ers no distinguished processor i e all processors perform the same algorithm The algorithm can deal with any kind of schedulings even unfair ones Our protocol is a randomized self stabilizing meaning that starting from an arbitrary con guration in response ...
Over the past twenty years, Secure Digital memory cards have become most popular digital storage media. Therefore, forensic experts need to develop techniques enable recovery of data, especially from severely damaged by accidents, air crashes, terrorist attacks or deliberate attempts criminals destroy evidence. The paper discusses non-invasive and invasive diagnostics available experts, with de...
To improve the scalability of InfiniBand on large scale clusters Open MPI introduced a protocol known as B-SRQ [2]. This protocol was shown to provide much better memory utilization of send and receive buffers for a wide variety of benchmarks and real-world applications. Unfortunately B-SRQ increases the number of connections between communicating peers. While addressing one scalability problem...
Objective(s): Stress alters sensory and cognitive function in humans and animals. Angiotensin (AT) receptors have demonstrated well-established interactions in sets of physiological phenomena. AT1 receptors can play a part in stress-induced activation of hypothalamic-pituitary-adrenal (HPA) axis; besides angiotensinergic neurotransmission plays a pivotal role in stress-evoked physiological resp...
Sequential consistency is a multiprocessor memory model of both practical and theoretical importance. Unfortunately, the general problem of verifying that a finitestate protocol implements sequential consistency is undecidable, and in practice, validating that a real-world, finitestate protocol implements sequential consistency is very time-consuming and costly. In this work, we show that for m...
It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, sending, and composing messages, he can remember as much information as he needs. That is, his memory is unbounded. We recently proposed a weaker Dolev-Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev-Yao adv...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
introduction: previous studies have demonstrated that the &beta-adrenergic; receptor antagonist propranolol impairs fear memory reconsolidation in experimental animals. there are experimental parameters such as the age and the strength of memory that can interact with pharmacological manipulations of memory reconsolidation. in this study, we investigated the ability of the age and the strength ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید