نتایج جستجو برای: hack
تعداد نتایج: 658 فیلتر نتایج به سال:
Across almost all scientific disciplines, the instruments that record our experimental data and the methods required for storage and data analysis are rapidly increasing in complexity. This gives rise to the need for scientific communities to adapt on shorter time scales than traditional university curricula allow for, and therefore requires new modes of knowledge transfer. The universal applic...
It is a consensus that there exists learning barriers to become a skilled hacker. Hack forums are believed to be indispensable venues where to overcome these barriers. However, this belief has not been formally justified in academia. By studying post content, we find evidence of different posting behaviors in hack forums. One interesting result is that there are indeed some learning behaviors e...
The MIFARE Classic is the most popular RFID chip, used in public transport as well as cafeterias and other applications. This paper gives an overview of which methods were used to re-engineer the chips, from polishing to analyzing the communication. Within this process, various security weaknesses were discovered. Those allow various attacks, which will be shown in the last part of the paper.
to study the response of yield,yield components,protein and oil content of soybean cultivars to delay in planting in shirvan region, an experiment was conducted at research farm of the faculty of agriculture, shirvan in 2010. in this study, nine soybean cultivars (habit, hack, black hack, cencutry, cloumbos, clark, sahar, zane and willams) were evaluated at different sowing dates (20 may, 4 jun...
Bayesian classifiers provide relatively good performance compared with other more complex algorithms. Misclassification ratio is very low for trained samples, but in the case of outliers the misclassification error may increase significantly. The usage of ‘summation hack’ method in Bayesian classification algorithm can reduce the misclassifications rate for untrained samples. The goal of this p...
In recent years, wireless networks have become increasingly common and an increasing number of devices are communicating with each other over lossy links. Unfortunately, TCP performs poorly over lossy links as it is unable to differentiate the loss due to packet corruption from that due to congestion. In this paper, we present an extension to TCP which enables TCP to distinguish packet corrupti...
The concept ‘contentious expertise’ is proposed to account for technological expertise applied in controversies. Activists from the Chaos Computer Club, a German hacker group, adapted contentious when they built so-called clone of mobile phone SIM card 1998, and used publicly make call — free charge. activists blamed secret design cards, subsequently, was changed made fully public. activists’ t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید