نتایج جستجو برای: memory protocol

تعداد نتایج: 500200  

2002
Colette Johnen

We present a self stabilizing token circulation protocol on unidirectional anonymous rings This protocol does not required processor identi ers no distinguished processor i e all processors perform the same algorithm The algorithm can deal with any kind of schedulings even unfair ones Our protocol is a randomized self stabilizing meaning that starting from an arbitrary con guration in response ...

Journal: :IEEE Access 2022

Over the past twenty years, Secure Digital memory cards have become most popular digital storage media. Therefore, forensic experts need to develop techniques enable recovery of data, especially from severely damaged by accidents, air crashes, terrorist attacks or deliberate attempts criminals destroy evidence. The paper discusses non-invasive and invasive diagnostics available experts, with de...

2008
Galen M. Shipman Stephen W. Poole Pavel Shamis Ishai Rabinovitz

To improve the scalability of InfiniBand on large scale clusters Open MPI introduced a protocol known as B-SRQ [2]. This protocol was shown to provide much better memory utilization of send and receive buffers for a wide variety of benchmarks and real-world applications. Unfortunately B-SRQ increases the number of connections between communicating peers. While addressing one scalability problem...

Objective(s): Stress alters sensory and cognitive function in humans and animals. Angiotensin (AT) receptors have demonstrated well-established interactions in sets of physiological phenomena. AT1 receptors can play a part in stress-induced activation of hypothalamic-pituitary-adrenal (HPA) axis; besides angiotensinergic neurotransmission plays a pivotal role in stress-evoked physiological resp...

2001
Tim Braun Anne Condon Alan J. Hu Kai S. Juse Marius Laza Michael Leslie Rita Sharma

Sequential consistency is a multiprocessor memory model of both practical and theoretical importance. Unfortunately, the general problem of verifying that a finitestate protocol implements sequential consistency is undecidable, and in practice, validating that a real-world, finitestate protocol implements sequential consistency is very time-consuming and costly. In this work, we show that for m...

2013
Max I. Kanovich Tajana Ban Kirigin Vivek Nigam Andre Scedrov

It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, sending, and composing messages, he can remember as much information as he needs. That is, his memory is unbounded. We recently proposed a weaker Dolev-Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev-Yao adv...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :basic and clinical neuroscience 0
fatemeh taherian islamic azad university, damghan branch, damghan, iran. abbas ali vafaei laboratory of learning and memory, research center and department of physiology, school of medicine, semnan university of medical sciences, semnan, iran. gholam hassan vaezi islamic azad university, damghan branch, damghan, iran. sharaf eskandarian islamic azad university, damghan branch, damghan, iran. adel kashefi laboratory of learning and memory, research center and department of physiology, school of medicine, semnan university of medical sciences, semnan, iran. ali rashidy-pour laboratory of learning and memory, research center and department of physiology, school of medicine, semnan university of medical sciences, semnan, iran.

introduction: previous studies have demonstrated that the &beta-adrenergic; receptor antagonist propranolol impairs fear memory reconsolidation in experimental animals. there are experimental parameters such as the age and the strength of memory that can interact with pharmacological manipulations of memory reconsolidation. in this study, we investigated the ability of the age and the strength ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید