نتایج جستجو برای: aka

تعداد نتایج: 1885  

Journal: :IJGHPC 2010
Mamdouh Gouda

Next Generation Networks (NGN) is the evolution of the telecommunication core. The user has to execute multi-pass Authentication and Key Agreement (AKA) procedures in order to get access to the IP Multimedia Subsystem (IMS). This causes overhead on the AAA server and increases the delay of authenticating the user and that is because of unnecessary and repeated procedures and protocols. This pap...

2010
Zhiyao Duan Bryan Pardo

This abstract describes a real-time score follower that we submitted to MIREX 2010 “Real-time Audio to Score Alignment (aka. Score Following)” task.

Journal: :Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 2020

2004
Óscar Corcho Asunción Gómez-Pérez

We describe four ontology translation approaches that can be used to exchange ontologies between ontology tools and/or ontology languages. These approaches are analysed with regard to two main features: how they preserve the ontology semantics after the translation process (aka semantic or consequence preservation) and how they allow final users and ontology-based applications to understand the...

Journal: :Internal medicine 2004
Masami Tanaka Yasushi Miyazaki Shinsuke Ishikawa Kimihiko Matsuyama

We report 3 patients with alcoholic ketoacidosis (AKA). All had a history of excessive intake and abrupt termination of alcohol. They showed tachypnea, tachycardia, abdominal tenderness, and epigastralgia. Metabolic acidosis with an increased anion gap, decreased PaCO2 and ketonemia were present. One patient whose ratio of 3-hydroxybutyric acid to acetoacetic acid was 4.0 was associated with di...

2009
Imsung Choi Zeen Kim Kwangjo Kim

In this paper, we address the Authenticated Key Agreement(AKA) between actor and sensor nodes in Wireless Sensor and Actor Network (WSAN). We propose DoS-resilient AKA scheme between Actor and Sensor nodes in WSAN. The proposed scheme utilizes the IDbased cyrptosystem to reduce a need to transmit public-key certificates. The proposed scheme is resilient against the Denial of Service (DoS) attac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید