نتایج جستجو برای: mac

تعداد نتایج: 28801  

Journal: :Electr. Notes Theor. Comput. Sci. 2001
Moonjoo Kim Sampath Kannan Insup Lee Oleg Sokolsky Mahesh Viswanathan

We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance about the correct execution of target programs at run-time. Monitoring and checking is performed based on a formal speci cation of system requirements. MaC bridges the gap between formal veri cation, which ensures the correctness of a desi...

2011
Yevgeniy Dodis John P. Steinberger

Given an n-bit to n-bit MAC (e.g., a fixed key blockcipher) with MAC security ε against q queries, we design a variable-length MAC achieving MAC security O(εq poly(n)) against queries of total length qn. In particular, our construction is the first to break the “birthday barrier” for MAC domain extension from noncompressing primitives, since our security bound is meaningful even for q = 2/poly(...

Journal: :RFC 2014
Pranjal Kumar Dutta Florin Balus Olen Stokes Geraldine Calvignac Don Fedyk

RFC 4762 describes a mechanism to remove or unlearn Media Access Control (MAC) addresses that have been dynamically learned in a Virtual Private LAN Service (VPLS) instance for faster convergence on topology changes. The procedure also removes MAC addresses in the VPLS that do not require relearning due to such topology changes. This document defines an enhancement to the MAC address withdraw p...

2007
M. Kim S. Kannan I. Lee O. Sokolsky

We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance about the correct execution of target programs at run-time. Monitoring and checking is performed based on a formal speciication of system requirements. MaC bridges the gap between formal veriication, which ensures the correctness of a desi...

Journal: :Dalton transactions 2012
Yun Ling Feilong Yang Mingli Deng Zhenxia Chen Xiaofeng Liu Linhong Weng Yaming Zhou

Two novel Zn(II) metal-organic frameworks (MOFs) constructed by trinuclear-triangular and paddle-wheel units, namely {[Zn(5)(dmtrz)(3)(IPA)(3)(OH)]·DMF·H(2)O}(n) (MAC-4, Hdmtrz = 3,5-dimethyl-1H-1,2,4-triazole, H(2)IPA = isophthalic acid, DMF = dimethyl formamide) and {[Zn(5)(dmtrz)(3)(OH-IPA)(3)(OH)]·DMF·5H(2)O}(n) (MAC-4-OH, OH-H(2)IPA = 5-hydroxyisophthalic acid), were solvothermally synthes...

2013
Long Chen Xiao-jun Li Yuan-bo Guo Liang-min Wang

Medium Access Control (MAC) protocols of Wireless Sensor Network (WSN) are often required to have special characteristics in concrete applications. Related and Urgent message should be sent First (RUF) is a typical scenario in many applications of WSN. In this paper, we focus on presenting a MAC protocol for RUF applications in WSN. First of all, through analysis, some concrete cases of RUF sce...

Journal: :The Journal of Experimental Medicine 1983
D Koffler G Biesecker B Noble G A Andres A Martinez-Hernandez

The role of the membrane attack complex (MAC) as a mediator of renal tissue injury was evaluated in rats affected by bovine serum albumin (BSA)-induced immune complex glomerulonephritis. Immunofluorescence studies revealed concurrent deposits of IgG, BSA, C3, and the MAC along glomerular capillary walls, although the MAC manifested a more restricted distribution than that observed for immune co...

Journal: :CoRR 2016
Yimin Pang Mahesh K. Varanasi

An approximate capacity region is established of a class of interfering multiple access channels consisting of two multiple-access channels (MACs), each with an arbitrary number of users, with interference from one of the transmitters of one MAC to the receiver of the other MAC, which we refer to henceforth as the MAC-IC-MAC. It is shown that, for the semi-deterministic MAC-IC-MAC, single-user ...

2012
Hao Wang Vyacheslav Zalyubovskiy Vladimir Shakhov Hyunseung Choo

Wireless Sensor Network MAC protocols usually employ periodic sleep and wakeup, achieving low dutycycle to save energy and to increase the lifetime of batterypowered sensor devices. Previously proposed PW-MAC (Predictive Wakeup MAC) protocol is based on asynchronous duty cycling. PW-MAC minimizes sensor node energy consumption by enabling senders to predict receiver′s wakeup times. However, PW-...

2014
P. Dutta F. Balus

RFC 4762 describes a mechanism to remove or unlearn Media Access Control (MAC) addresses that have been dynamically learned in a Virtual Private LAN Service (VPLS) instance for faster convergence on topology changes. The procedure also removes MAC addresses in the VPLS that do not require relearning due to such topology changes. This document defines an enhancement to the MAC address withdraw p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید