نتایج جستجو برای: tesla protocol

تعداد نتایج: 257266  

Journal: :RFC 2010
Vincent Roca Aurélien Francillon Sebastien Faurite

This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...

2010
A. Francillon

This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...

2011
Peter Bernhardt Robert Gradinger Thomas Walcher Wolfgang Rottbauer

Background Cardiac magnetic resonance imaging (CMR) including adenosine perfusion and late gadolinium enhancement (LGE) at 1.5 Tesla (T) has been established for noninvasive detection of relevant coronary artery disease (CAD). However, little is known about the potential advantages of 3.0-T to detect CAD. The aim of our prospective study was to compare a compiled clinical routine CMR protocol p...

2014
Li Wu Chen Wang Xiuzhong Yao Kai Liu Yanjun Xu Haitao Zhang Caixia Fu Xiaolin Wang Yingyi Li

The aim of this study was to successfully establish an orthotopic murine model using two different human pancreatic adenocarcinoma cell lines and to propose a 3.0 tesla MRI protocol for noninvasive characterization of this model. SW1990 and MIAPaca-2 tumor cells were injected into the pancreas of BALB/C nu/nu mice. Tumor growth rate and morphological information were assessed by 3.0 tesla MRI (...

2009
Y-C. Kim J. L. Go S. Banerjee M. Law H. H. Hu K. S. Nayak

Introduction Temporomandibular joint (TMJ) dysfunction is a cause of headache, facial pain and referred otalgia, which can be quite debilitating to patients. MRI has been applied in limited circumstances to define contours of the articular disc, and to evaluate disc motion during translation of the condyle with opening and closing of the mouth. Broad implementation of an effective protocol has ...

2011
Golmehr Ashrafpoor Susanna Prat- Gonzalez Amir-Ali Fassa Yannick Yannick Magliano Alain Naïmi Juan Sztajzel

Methods We reviewed the data of all patients who were referred for stress CMR (1.5 Tesla) from February 2006 to February 2010 to the Centre de Diagnostic Radiologique de Carouge, an outpatient imaging center. Standard protocol consisted of: 1) assessment of myocardial function at rest; 2) pharmacological stress induced either by dobutamine (protocol of 10, 20, 30, 40 μg/kg/min during 3 minutes ...

2010
Atsuko Miyaji Kazumasa Omote

In many wireless sensor network applications, the data collection sink (base station) needs to find the aggregated statistics of the network. Readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. However, the previous optimally secure in-network aggregation protocols against multiple corrupted nodes require two round-trip communications between each n...

Journal: :IEICE Transactions 2011
Atsuko Miyaji Kazumasa Omote

SUMMARY Wireless Sensor Networks (WSNs) rely on in-network ag-gregation for efficiency, that is, readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. However, the previous optimally secure in-network aggregation protocols against multiple corrupted nodes require two round-trip communications between each node and the base station, including the resul...

Journal: :International journal of wireless and mobile networks 2021

To fulfill two integral aims of abating cellular traffic and enhancing efficiency network, D2D is considered as a novel channel communication. This form communication has introduced for 4th enacts significant role in the 5th generation. Four scenarios defined references, includes direct relaying both with without infrastructure. One major challenges addressing protocols contributes to fact that...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید