نتایج جستجو برای: 2004 and 2004
تعداد نتایج: 16841472 فیلتر نتایج به سال:
The objective of this study was to characterize the reproduction of Cichla kelberi in an artificial lake, located in the municipality of Leme, in the state of São Paulo, Brazil. Breeding occurred in spring, and summer. The L(50) and the L(100) of this species were 192 and 235 mm (L(50)), for males and females, respectively, and 290 mm (L(100)) for both sexes. Spawning was parceled. The oocytes ...
Affinely-Adjustable Robust Counterparts provide tractable alternatives to (two-stage) robust programs with arbitrary recourse. We apply them to robust network design with polyhedral demand uncertainty, introducing the affine routing principle. We compare the affine routing to the well-studied static and dynamic routing schemes for robust network design. All three schemes are embedded into the g...
Web-based authentication is a popular mechanism implemented by Wireless Internet Service Providers (WISPs) because it allows a simple registration and authentication of customers, while avoiding high resource requirements of the new IEEE 802.11i security standard and backward compatibility issues of legacy devices. In this work we demonstrate two different and novel attacks against web-based au...
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
IEEE 802.11 wireless networks have gained great popularity. However, handoff is always a critical issue in this area. In this paper, we propose a novel seamless handoff mechanism for IEEE 802.11 wireless networks which support IEEE 802.11i security standard. Our approach consists of a Dynamic Tunnel Establishing procedure and a seamless handoff mechanism. Dynamic Tunnel Establishing is for each...
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
A new species of penicillate millipede, from genus Monographis (Diplopoda: Polyxenidae), was collected from Trang Bom and Dinh Quan, within the Dong Nai province, southern Vietnam. Taxonomic characteristics of the genus Monographis Attems, 1907, were used to formally describe this new species. Sensilla of the 6th antennal article and claw structures of Monographis dongnaiensis were c...
Wireless networks are commonly used by people. Market devices are equipped with the new security standard 802.11i. The standard announced in the middle of 2004 is commonly used to protect WLANs. Currently we can find the information that vulnerabilities were found in that standard. Then a question arises: Are WLANs compromised again? The article describes vulnerabilities which were discovered i...
A new species of indotyphlid caecilian amphibian, Gegeneophis tejaswini sp. nov., is described based on eight specimens from lowlands of the most northerly district of the state of Kerala in the southern part of the Western Ghats region, India. This species is distinguished from all other Gegeneophis in annulation characters and genetics (> 6% different from most similar nominal species for ...
Wireless networks are commonly used by people. Market devices are equipped with the new security standard 802.11i. The standard announced in the middle of 2004 is commonly used to protect WLANs. Currently we can find the information that vulnerabilities were found in that standard. Then a question arises: Are WLANs compromised again? The article describes vulnerabilities which were discovered i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید