Search results

Jump to navigation Jump to search
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 08:56, 8 February 2005
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 16:17, 19 November 2004
  • .... Any topic. Affordable prices. Order 100% custom-written term papers from a reputable custom writing. Quality assistance from professional writers.
    506 bytes (72 words) - 14:33, 20 July 2010
  • A '''blind credential''' is a token asserting that someone qualifies under some criteria or has some stat ...is not using another's credential — identity theft — therefore a great deal of effort goes into the application of cryptography to authentic
    855 bytes (133 words) - 00:42, 8 March 2005
  • ...by disclosing the password to a third party by accident, on purpose, or as a result of deception?<br><br> 2. Will the user enter the password correctly (at least with a high probability)?<br><br>
    616 bytes (102 words) - 19:21, 8 November 2004
  • ...llenge to get the BRN software for a new target platform you have to build a (cross) compiler.<br> A compiler translates a high-level programming language (like C or C++) into binary code for execut
    2 KB (259 words) - 12:27, 23 October 2006
  • '''Q:''' Why does VMware Server not autostart a VM? '''A:''' Have a look at the latest log file below /tmp/vmware-<username>/ and
    544 bytes (80 words) - 21:23, 3 May 2007
  • - Instead of (A^N)/2 it only takes A^(N/2) (A = alphabet of characters, N = number of characters used for the password)<b
    445 bytes (76 words) - 22:53, 8 November 2004
  • - Leads always to the used password but is a matter of time and compute power<br> - Total exhaust time is 968 or 252, the average effort for a search is half of this<br><br>
    643 bytes (102 words) - 23:30, 8 November 2004
  • The folder /src is a mirror and thus provides a better reliability (redundancy). If the master server breaks down we still Historically we had a ressource problem on the master server. To solve this we moved the folder /
    604 bytes (87 words) - 15:46, 21 October 2011
  • In a typical system, human users must authenticate themselves to a client through in general three possible ways:
    779 bytes (109 words) - 19:09, 8 November 2004
  • - A program running in the background in a public terminal room<br>
    345 bytes (51 words) - 10:19, 17 May 2006
  • You need a Linux system with approximately 1GB free disk space to download and compile ===What is a toolchain?===
    1 KB (211 words) - 19:36, 22 February 2006
  • ...a different password each time authentication is needed and to never reuse a used password. Also it must not be possible to easily compute yet unused pa # Systems based on a non-inversible function, e.g. cryptographically secure hash functions
    3 KB (448 words) - 00:53, 6 November 2004
  • ...e Macronix 29LV320CVBC-90G Flash] chip. The ethernet ports are provided by a [http://www.delta.com.tw Delta] LFE8782 transformer. There are no obvious i ...om/release_notes/d103016.asp firmware page] also describes how to download a new firmware via TFTP. [http://openwrt.org/ OpenWRT] does not [http://wiki.
    2 KB (345 words) - 05:06, 6 February 2007
  • A composition of the topic can be found [[Properties of the Wireless Medium | ...in.de/~beier/pdfs/brn-06-802.11%20Network%20Structures.pdf presentation as a pdf].
    882 bytes (132 words) - 20:29, 17 October 2006
  • ...p://www.glink.com.tw/pdf/GLT5640L16-R3.3.pdf G-Link GLT5640L16-6TC], Flash a 2 MByte [http://www.spansion.com/products/Am29LV160B.html AMD/Spansion AM29
    1 KB (189 words) - 07:51, 28 January 2007
  • ...elieved that fingerprints posess the two requirements necessary for use as a biometric criterion: ...s ever share exactly the same pattern. What is more: experience shows that a small amount (usually 12 to 18) of minute details (minutiae, see below) are
    810 bytes (119 words) - 07:49, 3 March 2005
  • ...ed time budget to read books. In order to learn as much as possible about a subject XYZ, which books should I read? (I can't read them all due to lack A: Obviously, I do not know the books yet.
    1 KB (219 words) - 09:11, 26 January 2006
  • Simple flooding algorithms simply forward a packet several times to increase the possibility that the packet will reach it's destination in a certain time interval or
    3 KB (432 words) - 08:59, 20 October 2006
  • The purpose of the XML Schema language consists in a XML document’s validation. Thus, you can create application specific cons ...and separate elements in the document. The attribute xmlns indicates, that a namespace declaration follows:
    3 KB (397 words) - 23:33, 24 January 2005
  • ...put ejb-jar file is either a deployment unit intended for the Deployer, or a partially assembled application that is intended for another Application As ...and Application Assembler may be the same person or organization. In such a case, the person or organization performs the responsibilities described bo
    1 KB (181 words) - 10:39, 17 May 2006
  • - Carriage return bug after a wrong password entry<br> - Using shadow passwords (encrypted passwords hidden in a private file)
    502 bytes (80 words) - 22:58, 8 November 2004
  • Aradial is a high performance RADIUS server with Tier 1 levels of reliability and scalab a multitude of pre-configured settings that support most Access Servers in th
    1 KB (160 words) - 07:55, 3 April 2005
  • - NCC-1701D is not a good choice<br> - A password which seems to be a random combination<br>
    2 KB (292 words) - 21:54, 8 November 2004
  • ...nologies. It has been founded in 2001 by Sun and several partners to build a decentralized and open alternative to the centralized and proprietary Passp ...the use of [http://www.swig.org/ SWIG]. Closely related to LASSO is SOUK, a Python framework that uses LASSO and actually implements the Liberty Allian
    2 KB (248 words) - 10:36, 6 October 2011
  • Today there exist a lot of projects worldwide, using the WLAN-Technology, to realize wireless o also exist some research projects with a academic or commercial background.
    3 KB (398 words) - 01:24, 11 June 2005
  • ...hieves a better worst-case delay performance than existing approaches with a fixed overhead. ...n more detail, if an erasure code has a message of size <math>M</math> and a replication factor <math>r</math> as input, it produces <math>M*r/b</math>
    2 KB (423 words) - 09:01, 20 October 2006
  • because in case of, e.g. a raid this would compromise the users' anonymity. # The user sends his authentication information along with a new public key PK1 to an identity provider. The identity provider must know
    2 KB (364 words) - 21:55, 31 October 2006
  • A PKI consists of a Registration Authority (RA) and a Certification Authority (CA). At the following Picture you can see how a signed certificate is generated.
    1 KB (194 words) - 22:34, 18 January 2005
  • ...sses to share memory. Sharing memory for two processes means that there is a region of memory which both processes can access (read/write) such that bot ...his region starts at address MA, in Process B it starts at address MB. Let A write the value 0x23 to MA+4, that is, 4 bytes into the shared region. Then
    2 KB (265 words) - 20:44, 10 April 2005
  • ...rner-Allen, Johnson, Ruiz, Lees, Welsh: Monitoring Volcanic Eruptions with a Wireless Sensor Network [http://earth.unh.edu/johnson/PAPERS/ewsn.pdf] * Werner-Allen, Lorincz, Ruiz, Marcillo, Johnson, Lees, Welsh: Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, acce
    2 KB (261 words) - 09:08, 25 January 2006
  • SETI (Search for Extraterrestrial Intelligence) is a scientific area whose goal is to detect intelligent life outside of earth. To our knowledge such signals do not exist naturally. A discovery of those should therefor be caused by extraterrestrial technology
    1 KB (216 words) - 14:42, 31 October 2005
  • - Keeping a plaintext file of passwords is dangerous<br><br> - Entry is encrypted and only if the value matches a stored one, the login is accepted<br>
    476 bytes (76 words) - 23:08, 8 November 2004
  • to a consecutive log before the data write. If a crash occurs during the write,
    3 KB (486 words) - 15:07, 4 May 2007
  • Click is a modular software router developed by MIT. * Flexible control of parallelism in a multiprocessor PC router ([[Media:Click-paper.pdf|PDF]])
    623 bytes (80 words) - 21:22, 5 April 2005
  • An attack, where the hacker will extract the password directly from a person, who is authorized to access it by telling some plausible untruth is ...'. Insurance investigators for example often pretend on a phone call to be a desired victims doctor, so that they will get information concerning the vi
    994 bytes (159 words) - 19:35, 8 November 2004
  • ''Secret Sharing'' is used to split a secret (usually a key) into several pieces which are then given to distinct persons so that s == A Simple Approach ==
    3 KB (454 words) - 13:15, 1 December 2004
  • - A Dictionary Attack can be used, if a password file can be accessed (system can run tests offline)<br>
    540 bytes (86 words) - 23:12, 8 November 2004
  • static void swap_byte(unsigned char *a, unsigned char *b); static void swap_byte(unsigned char *a, unsigned char *b)
    2 KB (171 words) - 10:32, 31 October 2006
  • ...eless routers] - called Meraki mini - are currently available only through a beta program. ...m/products/partdetail?part=MT48LC16M16A2P-75 MICRON MT48LC16M16A2P-75] and a 8 MByte [http://www.sd.com SD] Flash. [http://www.realtek.com.tw/products/p
    2 KB (360 words) - 07:29, 11 April 2007
  • BitTorrent is a Peer2Peer filesharing protocol. It was designed in 2001 by Bram Cohen, to r ...belong to one file are named in a so called '''torrent-file''', which is a meata data file also containing the hash cheksums for each piece and additi
    4 KB (680 words) - 14:41, 19 July 2007
  • ...nsparent switch for it's participants. It is my goal to make it useable as a variable multi-switch. Encryption and authentication will be added to secur * List of standard/basic papers a ''person skilled in the art'' should have read.
    2 KB (319 words) - 21:20, 30 January 2006
  • = Creating a Standard Development Environemnt = ...ory buildroot and copy the necessary files into it. You can choose between a tarball or filesystem image, which can be loop mounted into your running Li
    2 KB (269 words) - 13:49, 8 September 2006
  • ...e OpenMoko is built on top of OpenEmbedded). In order to do this we create a new directory tree <code>openmoko-sar</code> next to <code>oe</code> and <c ...-devel-image.bb</code>. At a later time we plan to put this structure into a version control system.
    2 KB (265 words) - 03:12, 12 July 2007
  • ...ombinations of letters, signs and numbers used to authenticate one user on a system.<br><br> <br><br>A further introduction is available [[Passwords - Introduction|here]].
    657 bytes (100 words) - 18:44, 8 November 2004
  • This is about getting a mesh node to act as a internet gateway. There are different procedures for user- and kernel space ...g devices, doing NAT, ...) can be discussed separately. Especially we need a mechanism to detect, if we have internet connectivity.
    2 KB (310 words) - 09:52, 25 January 2006
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • ...ization und functioning of the METRIK testbed network. It's supposed to be a first guide for developers and scientists who do experiments on this networ The main purpose of the testbed network is to serve as a real-world scenario for testing and experimenting. In order to do that we u
    2 KB (212 words) - 11:41, 8 May 2013
  • In May 1999 Windows and MAC version were released and within a week 200.000 people downloaded and installed the client. ...e classic client) had 232.420 users with 494.090 computers. There is still a migration from the classic client (as described here) to the new BOINC clie
    1 KB (156 words) - 14:43, 31 October 2005
  • '''JavaBeans''' is a client-side component model. It is intended to be used for
    138 bytes (20 words) - 16:20, 11 November 2004
  • '''Bugs''' are errors that are done at the implementation level. A well known example are buffer overflows. A very good description of buffer overflows has been written by Aleph One "Sm
    2 KB (283 words) - 12:24, 25 January 2005
  • ** Difference in fulfilling a request * Used bandwidth for fulfilling a request (number of packets or bytes?)
    1 KB (162 words) - 10:04, 27 January 2006
  • ...P or serial connection. At first we have to build both a debugger stub and a cross-debugger (note that the host debugger which is shipped with the linux ...fy an executable which is load or attach it to a running process. To debug a process with PID 333 for example, simply type
    3 KB (447 words) - 10:57, 22 April 2007
  • so that every write creates a consistent state. On a typical file system there are files, directories and pointers to these.
    3 KB (524 words) - 15:04, 4 May 2007
  • ...ich an entity attempts to confirm that another entity is allowed to access a resource. For example, it is often desirable to grant access without requiring a unique identity. Familiar examples of [[authorization token]]s include keys
    2 KB (288 words) - 00:35, 8 March 2005
  • ...mplex the user might have problems entering it correctly and especially in a case of urgent (or safety) operations this would be not useful.<br><br> ...mple:'' South African Prepaid Electricity with 20-digit numbers – although a third of the population is illiterate, entry errors were the major problem
    695 bytes (107 words) - 20:47, 8 November 2004
  • This task requires knowledge in C/C++ and to a certain amount working with the compiler tools lex/flex and yacc/bison. There you find examples of working flex/bison code too and a makefiles.
    929 bytes (149 words) - 11:59, 19 April 2005
  • [[Image:Brn.Gui-500Nodes.png|none|right|thumb|400px|Brn.Gui running a simulation with 500 nodes.]] ...in simulation code via the Brn.Measure framework. Furthermore, it is also a result browser for already completed simulations which were executed by the
    3 KB (498 words) - 14:24, 16 March 2008
  • ...uler of the world *harharhar*. Some of these are presented here. There are a lot more techniques used that are not presented here.
    1 KB (190 words) - 11:25, 30 January 2005
  • ...antenna will be connected to the WRT54GS through a cable, which is called a pigtail. The pigtail has two connectors: One that connects to the WRT54GS, ...can be used, but try to keep their length and the number of connectors at a minimum as they all reduce the strength of the received/transmitted radio s
    1 KB (175 words) - 19:07, 11 March 2005
  • With one-bit complex sampling this yields a frequency band of 2.5 MHz which is enough to handle doppler shifts for rela ...ted via the Internet to the clients. The client program computes a result (a set of candidate signals) and returns it to the server. As mentioned in the
    3 KB (547 words) - 14:42, 31 October 2005
  • .../wndw.net/pdf/wndw-ebook.pdf Wireless Networking in the Developing World], A practical guide to planning and building low-cost telecommunications infras * Pentland A, Fletcher R, Hasson A. [http://www.firstmilesolutions.com/documents/DakNet_IEEE_Computer.pdf DakN
    1 KB (193 words) - 13:56, 3 March 2006
  • * MSC Tracer provides on-line behaviour of a Click router embedded NS2 simulator. [[Image:Brntracer.png|thumb|250px|Desc
    152 bytes (22 words) - 11:46, 21 November 2006
  • * the abbreviation for '''S'''imple '''O'''bject '''A'''ccess '''P'''rotocol The protocol serves as a distributed object protocol such as RMI or CORBA-IIOP. Thus, whereas RMI is
    5 KB (753 words) - 00:09, 25 January 2005
  • ...atest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and
    1 KB (159 words) - 14:39, 18 June 2005
  • <dt>User management</dt> <dd><ul><li>RP has a database with two unrelated tables: <ul><li>UserIDs and accompanying data</ ...fusing creation if this is the case (counters Sybil attack)</li><li>Create a new UserID and enter it into the database; at the same time enter the realn
    4 KB (699 words) - 01:57, 13 May 2006
  • ...ew routing technologies or the extension of existing VoIP technology (e.g. a SIP extension) MAY result from this work, development of new VoIP technolog * If successful, this contribution will allow to give a statement whether VoIP in current mesh networks is possible, and if not, wh
    2 KB (311 words) - 08:51, 23 April 2006
  • ...ization und functioning of the METRIK testbed network. It's supposed to be a first guide for developers and scientists who do experiments on this networ The main purpose of the testbed network is to serve as a real-world scenario for testing and experimenting. In order to do that we u
    2 KB (238 words) - 20:08, 1 November 2012
  • ...ions are special [[one way functions]] that can be easily inverted knowing a secret or trapdoor.
    157 bytes (22 words) - 09:29, 8 February 2005
  • ...hardships on peers with slow links and those holding many unpopular files, a rule was established which gives uploading more points than downloading. Fu ...rg/events/worlds04/tech/full_papers/yang/yang_html/maze.html Deployment of a Large-scale Peer-to-Peer Social Network]
    1 KB (201 words) - 18:19, 26 July 2007
  • ...f concept] of the [http://www.dtnrg.org DTN research group] views a DTN as a network of networks, as some sort of overlay on top of other nets, being ab ...ocator'' a node belonging to this network. Note that addressing ''within'' a region/network can be completely different, it's up to the network how this
    4 KB (650 words) - 16:18, 18 July 2006
  • * [[DistSim|DistSim]] is a framework for defining, executing and collecting the results of multiple si
    155 bytes (20 words) - 15:16, 16 February 2007
  • ...f Trust between peers is measured in a Matrix M. This N * N matrix defines a one-step rank among peers. ...normalized download volume that a peer i has received from a peer j during a period of time.
    3 KB (412 words) - 16:00, 5 August 2007
  • ...://www.hu-berlin.de/ Humboldt University Berlin]. The goal is to construct a network of nodes (access points) which share Internet access over wireless ...nges and higher data rates, as soon as such equipment becomes available at a reasonable price.
    4 KB (597 words) - 12:28, 21 November 2006
  • The container provides a runtime-environment for an enterprise bean and offers services, like contai As a result the bean depends on the container in every aspect. There are three w
    9 KB (1,399 words) - 06:32, 23 February 2005
  • ...sin for writing programs that run on unused workstations, typically within a single organization. ...cientific research and the creation of global communities centered arround a specific scientific interest.
    3 KB (449 words) - 14:51, 31 October 2005
  • ...erent implementations: RMI/[[JRMP]] commonly just referred to as "RMI" and a [[CORBA]] compliant implementation called RMI-[[IIOP]]. When the client invokes a remote method a so called stub on the client side marhalls the invokation and sends it to t
    5 KB (747 words) - 06:56, 11 April 2005
  • ** USB-A socket ''The enclosure can be opened by pressing the brackets with a slotted screwdriver '''towards''' the device.''
    2 KB (348 words) - 08:58, 7 March 2007
  • ...project - especially by adding code for OpenWRT - feel free to ask us for a CD with the WRT Standardized Development Environment (in short WRTSDE), whi ...create a new empty directory, which will later contain a complete copy of a Linux installation - the WRT standardized development environment.
    2 KB (282 words) - 08:30, 8 February 2005
  • ...shower. Creating a scale map of your bed room, living space, or kitchen is a great way to study about drawing maps. The home was found at 10050 Cielo Dr
    4 KB (632 words) - 19:44, 2 December 2012
  • ...be setup in the city of Berlin and whether such a network can be build in a completely self-organizing/self-configuring way. The Berlin Roof Net projec A community network must be usable for inexperienced end users; thus self-org
    3 KB (412 words) - 08:08, 18 November 2010
  • Unfortunately there is a big dilemma dealing with passwords as described by Kaufman, Perlman and Spe A simple way to test passwords on their own security is issued by the DSB Zü
    1 KB (242 words) - 19:00, 8 November 2004
  • ...Service Providers, though it may as well be used on any network that needs a centralized authentication and/or accounting service for its workstations. Radius supports a wide variety of authentication schemes. A user supplies his authentication data to the server either directly by answ
    2 KB (378 words) - 13:52, 10 April 2005
  • ...Service Providers, though it may as well be used on any network that needs a centralized authentication and/or accounting service for its workstations. Radius supports a wide variety of authentication schemes. A user supplies his authentication data to the server either directly by answ
    2 KB (378 words) - 13:53, 10 April 2005
  • ...nd credential]], in contrast, does not establish identity at all, but only a narrow right or status of the user or program. ...lled by insisting on an authentication procedure before access is granted. A few examples are given below.
    5 KB (725 words) - 05:10, 31 August 2005
  • ...ovider’s tools. A client never references an entity bean instance directly—a client always references an entity EJBObject or EJBLocalObject whose class ...related entity bean never references another entity bean instance directly—a related entity bean, like any other local client of an entity bean, always
    2 KB (304 words) - 13:17, 1 December 2004
  • ...ularly use the Project Seminar to report progress in each topic, following a fixed schedule - one topic / day, repeating the series after 4 weeks. #* Responsible: A. Zubow, M.Kurth
    3 KB (377 words) - 10:32, 21 July 2006
  • > update add testabcdef.sar.informatik.hu-berlin.de 300 A 127.0.0.1 > update delete testabcdef.sar.informatik.hu-berlin.de A
    1 KB (138 words) - 21:33, 22 February 2006
  • Also have a look at:
    305 bytes (50 words) - 09:24, 16 June 2006
  • '''A:''' Check out the latest click configuration from https://sarforge.informat
    427 bytes (56 words) - 10:57, 10 January 2007
  • It is sometimes viewed as a concept separate from software reliability. (Note that the separation betwe ...rity as an aspect of software dependability. After all, the reliability of a system can be defined as
    4 KB (569 words) - 16:14, 5 July 2005
  • ...ularly use the Project Seminar to report progress in each topic, following a fixed schedule - one topic / day, repeating the series after 4 weeks. #* Responsible: A. Zubow, M.Kurth
    3 KB (389 words) - 05:50, 12 March 2007
  • be tested and fulfil several specifications. Sometimes a framework to solve an issue if you can teach a developer about a framework
    5 KB (839 words) - 11:51, 13 April 2007
  • ...DART satisfies the following properties which can be seen as guideline for a scalable and efficient solution: Using dynamic addressing and appropriate routing, DART is a promising approach for achieving scalable routing in large ad hoc networks.
    7 KB (1,035 words) - 08:24, 9 October 2007
  • :A user registers a number of spam-accounts to download from his main-account. Thus he transfer ...d to normalized download volumes that ''i'' has received from ''j'' during a certain time period. In order to increase its local view of reputation, eac
    4 KB (565 words) - 10:09, 30 July 2007
  • as transmission medium to build a local area network. It also includes an infra-red technique for data-transm a group of stations communicating through an ''access point'' (AP),
    3 KB (465 words) - 13:34, 10 February 2005
  • :A user registers a number of spam-accounts to download from his main-account. Thus he transfer ...d to normalized download volumes that ''i'' has received from ''j'' during a certain time period. In order to increase its local view of reputation, eac
    4 KB (567 words) - 16:31, 5 August 2007
View ( | ) (20 | 50 | 100 | 250 | 500)