نتایج جستجو برای: misbehavior
تعداد نتایج: 965 فیلتر نتایج به سال:
Traditionally, computer games have been used for entertainment and more recently, education. However, the potential for games to be used in other contexts is now becoming an area of interest for researchers. We propose that games can be used in areas such as social behavior research, particularly in the area of consumer misbehavior. Using game design that supports research problems and provides...
In Drosophila males and females mutant for the ord gene, sister chromatids prematurely disjoin in meiosis. We have isolated five new alleles of ord and analyzed them both as homozygotes and in trans to deficiencies for the locus, and we show that ord function is necessary early in meiosis of both sexes. Strong ord alleles result in chromosome nondisjunction in meiosis I that appears to be the c...
A new method for injecting faults in the configuration bits of SRAM-based FPGAs is proposed. The main advantages over previous methods are its ability to simultaneously inject several faults or bit-flips in the FPGA by “pipelining” the fault injection process. The design to be tested is divided into modules. The first step in the fault injection technique would be inserting one fault in each of...
Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes. MANET has variety of applications such military, disaster stuck areas and the characteristics like dynamic topology, no fixed infrastructure etc. Still there are some security issues and challenges in it. MANET is vulnerable to various attacks due to its open medium. Hence there is need to study in d...
Introduction: Misbehavior and over-activity are the most problems among children. However, how to communicate with children is important and may relate to their parenting style. Parenting styles play an important role in the formation of abnormality and normal personality behavior in children. The use of adaptive styles in children can lead to many negative consequences, including behavioral pr...
Traditional approach of providing network security has been to borrow tools and mechanisms from cryptography. However, the conventional view of security based on cryptography alone is not sufficient for the defending against unique and novel types of misbehavior exhibited by nodes encountered in wireless communication networks. Reputation-based frameworks where nodes maintain reputation of othe...
Self-organizing emergent multi-agent systems are a solution to reducing the operational expenditures of complex information technology systems. However, emergent behavior is inherently unpredictable, sacrificing the guarantee of efficiency for flexibility and scalability. The addition of self-adaptation through an Efficiency Improvement Advisor (EIA) provides the ability to increase efficiency ...
Although individual node cooperation is necessary for the correct execution of network protocols in Mobile Adhoc Networks, it is not always guaranteed. In this paper, we present a reputation mechanism aiming at enforcing node cooperation in clustered Mobile Ad-hoc Networks with centralized control. Misbehavior detection techniques for protocol attacks in the cluster formation phases of the netw...
Mobile Ad-hoc NETwork (MANET) is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack ...
Trust is the foundation of most congestion control protocols developed and deployed in the Internet today. Unfortunately, with the growth of the Internet, the assumption of universal trust is no longer tenable. A communicating entity can misbehave to obtain a self-beneficial bandwidth allocation. Thus, design of congestion control protocols that are robust to such misbehavior has become an impo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید