نتایج جستجو برای: eap

تعداد نتایج: 1364  

Journal: :Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention 2010
Jian Cheng Aurobrata Ghosh Tianzi Jiang Rachid Deriche

How to estimate the diffusion Ensemble Average Propagator (EAP) from the DWI signals in q-space is an open problem in diffusion MRI field. Many methods were proposed to estimate the Orientation Distribution Function (ODF) that is used to describe the fiber direction. However, ODF is just one of the features of the EAP. Compared with ODF, EAP has the full information about the diffusion process ...

2018
Jong-Min Lim Young Joon Lee Hyung-Rae Cho Dong-Chan Park Go-Woon Jung Sae Kwang Ku Jae-Suk Choi

The present study assessed the beneficial skeletal muscle‑preserving effects of extracellular polysaccharides from Aureobasidium pullulans SM‑2001 (Polycan) (EAP) on dexamethasone (DEXA)‑induced catabolic muscle atrophy in mice. To investigate whether EAP prevented catabolic DEXA‑induced muscle atrophy, and to examine its mechanisms of action, EAP (100, 200 and 400 mg/kg) was administered orall...

Journal: :RFC 2013
Julien Bournelle Lionel Morand Sebastien Decugis Qin Wu Glen Zorn

The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...

2004
J. Arkko H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP-AKA includes optional identity privac...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1389

abstract the primary purpose of this study was to explore the actual practices and cognitions of two groups of iranian eap teachers, i.e. language teachers and content teachers, with respect to teaching reading-comprehension and vocabulary. to this end, tehran university of medical sciences which authorizes both groups of teachers to teach eap courses was selected as the context of the study s...

Journal: :Computer Networks 2009
Salekul Islam J. William Atwood

IP multicast is best-known for its bandwidth conservation and lower resource utilization. The present service model of multicast makes it difficult to restrict access to authorized End Users (EUs) or paying customers. Without an effective receiver access control, an adversary may exploit the existing IP multicast model, where a host or EU can join any multicast group by sending an Internet Grou...

2011
Zhun Gong Yong Wang

The occupational health area is developing models with a variety of methods to address and prevent job stress at the organization-level. A review of literature on employee assistance program (EAP) was conducted to explore relevant methods from its perspective. Result reveals that EAP is a potential good partner in the efforts to prevent Job stress at organization-level. Keywords-job stress; str...

2009
Olaf Beyersdorff Yevgen Nebesov

In this paper we suggest a new approach to timetable information by introducing the “edge-converted graph” of a timetable. Using this model we present simple algorithms that solve the earliest arrival problem (EAP) and the minimum number of transfers problem (MNTP). For constant-degree graphs this yields linear-time algorithms for EAP and MNTP which improves upon the known Dijkstra-based approa...

Journal: :RFC 2008
T. Charles Clancy Madjid Nakhjiri Vidya Narayanan Lakshminath R. Dondeti

This document describes the Handover Keying (HOKEY) re-authentication problem statement. The current Extensible Authentication Protocol (EAP) keying framework is not designed to support re-authentication and handovers without re-executing an EAP method. This often causes unacceptable latency in various mobile wireless environments. This document details the problem and defines design goals for ...

2013
L. Morand

The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید