نتایج جستجو برای: ping
تعداد نتایج: 2860 فیلتر نتایج به سال:
Quantum secure direct communication protocols offer confidential transmission of classic information over the quantum channel without a prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of the security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information a...
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones). We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that ...
Existing techniques can geolocate an IP address to a metropolitan area. Through simulation, we evaluate the performance of these existing techniques within a metropolitan area network. We identify differences between metropolitan area networks and the wide area network. We describe and evaluate new techniques which are designed specifically for use on metropolitan area networks. We present Hop-...
We show that for any n ≥ 2, two elements selected uniformly at random from a symmetrized Euclidean ball of radius X in SLn(Z) will generate a thin free group with probability tending to 1 as X → ∞. This is done by showing that the two elements will form a ping-pong pair, when acting on a suitable space, with probability tending to 1. On the other hand, we give an upper bound less than 1 for the...
Cognitive inhibition, a key constituent of healthy cognition, has been shown to be susceptible age-related cognitive declines. Research that rehabilitation training can facilitate older adults maintain functions. Compared alone, the combination physical and exercises is more effective train adults’ Focusing on we design Ping Pong exergame in this work, which incorporates traditional task with g...
Spam blogs, or splogs feature plagiarized or auto-generated content. They create link farms to promote affiliates, and are motivated by the profitability of hosting ads. Splogs infiltrate the blogosphere at ping servers, systems that aggregate blog update pings. Over the past year, our work has focused on detecting and eliminating splogs. As techniques used by spammers have evolved, we have lea...
The siRNA pathway is an essential antiviral mechanism in insects. Whether other RNA interference pathways are involved in antiviral defense remains unclear. Here, we report in cells derived from the two main vectors for arboviruses, Aedes albopictus and Aedes aegypti, the production of viral small RNAs that exhibit the hallmarks of ping-pong derived piwi-associated RNAs (piRNAs) after infection...
Brief author introduction:Wang Yu, (1985-),Male, Information Processing. E-mail: [email protected] Abstract: As we know, hard handover scheme is adopted for LTE systems in recent years. In order to improve the performance of the overall system, L3-filter, hysteresis, and time-to-trigger window are investigated. In this paper, we propose a new mechanism with an adaptive time to trigger windo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید