نتایج جستجو برای: search protocols

تعداد نتایج: 391475  

2001
David Bainbridge George Buchanan John R. McPherson Steve Jones Abdelaziz Mahoui Ian H. Witten

This paper examines the issues surrounding distributed Digital Library protocols. First, it reviews three prominent digital library protocols: Z39.50, SDLIP, and Dienst, plus Greenstone’s own protocol. Then, we summarise the implementation in the Greenstone Digital Libary of a number of different protocols for distributed digital libraries, and describe sample applications of the same: a digita...

Journal: :Experimental and clinical transplantation : official journal of the Middle East Society for Organ Transplantation 2012
Hasan Otukesh Rozita Hoseini Nahid Rahimzadeh

Sensitization of recipients is an increasing problem in children. Some case series in children exist comparing the diverse desensitizing protocols. These protocols include intravenous immunoglobulin, cytomegalovirus immune globulin, plasmapheresis, and some adjunctive therapies such as rituximab. Desensitizing protocols have advantages and disadvantages. Clinical trials are required to determin...

2015
Olga L. Giraldo Alexander García Castro Óscar Corcho

In this poster we present the semantic and NLP layers in the development of our repository for experimental protocols. We have studied existing repositories for experimental protocols as well the experimental protocols themselves. We have identified end-­‐user...

1999
Sigrid Gürgens Javier López René Peralta

The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols...

Journal: :Wireless Networks 2003
John Sucec Ivan Marsic

Flood-search on-demand routing has received considerable interest for its application to mobile ad hoc networks. To alleviate the effects of flooding the network with control packets to discover a route, the concept of an expanding ring search (ERS) has been proposed elsewhere for reducing the packet transmission overhead of the route discovery process. Essentially, ERS consists of incrementall...

2001
Stefan Edelkamp Alberto Lluch Lafuente Stefan Leue

We present an approach to reconcile explicit state model checking and heuristic directed search. We provide experimental evidence that the model checking problem for concurrent systems, such as communications protocols, can be solved more eeciently, since nding a state violating a property can be understood as a directed search problem. In our work we combine the expressive power and implementa...

2000
Catherine Meadows

We have recently seen the development of a number of new tools for the analysis of cryptographic protocols. Many of them are based on state exploration, that is, they try to find as many paths through the protocol as possible, in the hope that, if there is an error, it will be discovered. But, since the search space offered by a cryptographic protocol is infinite, this search alone cannot guara...

2001
Stefan Edelkamp Alberto Lluch Lafuente Stefan Leue

We present an approach to reconcile explicit state model checking and heuristic directed search and provide experimental evidence that the model checking problem for concurrent systems, such as communications protocols, can be solved more efficiently, since finding a state violating a property can be understood as a directed search problem. In our work we combine the expressive power and implem...

2001
Stefan Edelkamp Alberto Lluch Lafuente Stefan Leue

We present an approach to reconcile explicit state model checking and heuristic directed search. We provide experimental evidence that the model checking problem for concurrent systems, such as communications protocols, can be solved more e ciently, since nding a state violating a property can be understood as a directed search problem. In our work we combine the expressive power and implementa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید