نتایج جستجو برای: year

تعداد نتایج: 592979  

Journal: :IEEE Distributed Systems Online 2006
Greg Goth

In 1999, when most of the computer industry’s cautionary buzz centered on finding and fixing Y2K flaws, a small group of MITRE engineers began work on the Common Vulnerabilities and Exposures dictionary. Prior to CVE, no standard nomenclature existed for network security holes. In fact, the security landscape was rife with different names for the same vulnerability, as vendors strove to differe...

Journal: :IEEE Computer 1997
Christopher Creel Bertrand Meyer Philippe Stephan

y now you have probably heard more than you really care to about the " millennium crisis, " also known as the Year 2000 problem or—license plate style —Y2K. If you haven't brushed off the whole thing altogether, you've probably included in your New Year's resolution plan for January 1, 2000, to wait a little before rushing to the airport, stepping into an elevator, or cashing in on your mutual ...

2012
Nubia L. Ramos Musa Sekikubo Dang Thi Ngoc Dzung Corinna Kosnopfel Florence Mirembe Annelie Brauner

2 Running title: Uropathogenic E. coli from pregnant women 3 4 Nubia L. Ramos*, Musa Sekikubo*, Dang Thi Ngoc Dzung, Corinna Kosnopfel, Fred 5 Kironde, Florence Mirembe, Annelie Brauner# 6 7 Department of Microbiology, Tumor and Cell Biology, Division of Clinical Microbiology, 8 Karolinska Institutet and Karolinska University Hospital, 17176 Stockholm, Sweden 9 Department of Obstetrics and Gyna...

Journal: :Science 1981
M B Callaham

A variety of laser applications in space, past, present, future and far future are reviewed together with the contributions of some of the scientists and engineers involved, especially those that happen to have South African connections. Historically, two of the earliest laser applications in space, were atmospheric LIDAR and lunar ranging. These applications involved atmospheric physicists, se...

2005
Stephen Hawk Kate M. Kaiser

Until the global economic downturn of the new millennium, demand for information technology (IT) professionals exceeded supply mostly due to specific skill sets such as integrating legacy applications with Web development, project management , telecommunications, mobile commerce, and enterprise resource planning. More firms are turning externally not only to local vendors but also to services a...

Journal: :IEEE Software 2001
Ralf Lämmel Chris Verhoef

0 7 4 0 7 4 5 9 / 0 1 / $ 1 0 . 0 0 © 2 0 0 1 I E E E problem; this impediment became known as the 500-Language Problem. In 1998, we realized that we had discovered a breakthrough in solving the 500LP— so we had something to offer regarding the Y2K problem. We immediately informed all the relevant Y2K solution providers and people concerned with the Y2K awareness campaign. In answer to our emai...

2012
Christoph Weidenbach Patrick Wischnewski

In this paper we develop a sound, complete and terminating superposition calculus plus a query answering calculus for the BSH-Y2 fragment of the Bernays – Schönfinkel Horn class of first-order logic. BSH-Y2 can be used to represent expressive ontologies. In addition to checking consistency, our calculus supports query answering for queries with arbitrary quantifier alternations. Experiments on ...

Journal: :Journal of Software: Evolution and Process 2017
Michele Tufano Fabio Palomba Gabriele Bavota Massimiliano Di Penta Rocco Oliveto Andrea De Lucia Denys Poshyvanyk

A broken snapshot represents a snapshot from a project’s change history that cannot be compiled. Broken snapshots can have significant implications for researchers, as they could hinder any analysis of the past project history that requires code to be compiled. Noticeably, while some broken snapshots may be observable in change history repositories (e.g., no longer available dependencies), some...

Journal: :Security and Communication Networks 2013
Szymon Szott Marek Natkaniec Andrzej R. Pach

Selfish users are known to be a severe security threat for wireless ad-hoc networks. In particular, they can exploit mechanisms designed to assure QoS in the network. In this paper the problem of backoff misbehavior in IEEE 802.11 EDCA networks is studied using a game-theoretic approach. First, it is shown how this selfish behavior can disrupt traffic differentiation. Then, a solution is propos...

1998
Fred B. Schneider Steven M. Bellovin Alan S. Inouye

3 INTRODUCTION The security of our nation, the viability of our economy, and the health and well being of our citizens rely today on infrastructures for communication, finance, energy distribution, and transportation. All of these infrastructures depend increasingly on networked information systems. That dependence, with its new levels and kinds of vulnerabilities, is attracting growing attenti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید