نتایج جستجو برای: ping

تعداد نتایج: 2860  

2011
PIOTR ZAWADZKI

Quantum secure direct communication protocols offer confidential transmission of classic information over the quantum channel without a prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of the security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information a...

2001
Mohamed G. Gouda Chin-Tser Huang Anish Arora

We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones). We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that ...

2008
Randolph Baden

Existing techniques can geolocate an IP address to a metropolitan area. Through simulation, we evaluate the performance of these existing techniques within a metropolitan area network. We identify differences between metropolitan area networks and the wide area network. We describe and evaluate new techniques which are designed specifically for use on metropolitan area networks. We present Hop-...

2015
ELENA FUCHS IGOR RIVIN

We show that for any n ≥ 2, two elements selected uniformly at random from a symmetrized Euclidean ball of radius X in SLn(Z) will generate a thin free group with probability tending to 1 as X → ∞. This is done by showing that the two elements will form a ping-pong pair, when acting on a suitable space, with probability tending to 1. On the other hand, we give an upper bound less than 1 for the...

Journal: :International Journal of Computer Applications 2016

Journal: :International Journal of Human-computer Interaction 2021

Cognitive inhibition, a key constituent of healthy cognition, has been shown to be susceptible age-related cognitive declines. Research that rehabilitation training can facilitate older adults maintain functions. Compared alone, the combination physical and exercises is more effective train adults’ Focusing on we design Ping Pong exergame in this work, which incorporates traditional task with g...

2007
Pranam Kolari Timothy W. Finin Akshay Java Anupam Joshi

Spam blogs, or splogs feature plagiarized or auto-generated content. They create link farms to promote affiliates, and are motivated by the profitability of hosting ads. Splogs infiltrate the blogosphere at ping servers, systems that aggregate blog update pings. Over the past year, our work has focused on detecting and eliminating splogs. As techniques used by spammers have evolved, we have lea...

2012
Nicolas Vodovar Alfred W. Bronkhorst Koen W. R. van Cleef Pascal Miesen Hervé Blanc Ronald P. van Rij Maria-Carla Saleh

The siRNA pathway is an essential antiviral mechanism in insects. Whether other RNA interference pathways are involved in antiviral defense remains unclear. Here, we report in cells derived from the two main vectors for arboviruses, Aedes albopictus and Aedes aegypti, the production of viral small RNAs that exhibit the hallmarks of ping-pong derived piwi-associated RNAs (piRNAs) after infection...

2011
WANG Yu

Brief author introduction:Wang Yu, (1985-),Male, Information Processing. E-mail: [email protected] Abstract: As we know, hard handover scheme is adopted for LTE systems in recent years. In order to improve the performance of the overall system, L3-filter, hysteresis, and time-to-trigger window are investigated. In this paper, we propose a new mechanism with an adaptive time to trigger windo...

Journal: :Theory and Applications of GIS 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید