Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • ...T-KIT-MARK-II.html Metrix Mark II] is a complete outdoor solution based on a [Soekris board]. 2 [http://www.wneweb.com/pdf/CM9.pdf Wistron CM9] 802.11 a/b/g mini-PCI modules<br/>
    390 bytes (58 words) - 04:58, 8 February 2007
  • ...view corresponding to the web service endpoint interface, as described by a WSDL document.
    767 bytes (130 words) - 08:59, 8 February 2005
  • '''A''': <ol><li>On newer busybox versions the command after a ''shutdown'' keyword from the ''/etc/inttab'' file will be executed, e.g.: So a ''halt'' action will be followed by a ''reboot'' and the node will only executes the '''''halt''''' action.</li>
    658 bytes (109 words) - 19:28, 15 September 2006
  • ...or this is a telephone Book. It’s very easy to find a telephone number for a given name, but it’s really hard to find a name for a given number if you have to do it all by yourself.
    438 bytes (85 words) - 09:28, 8 February 2005
  • '''A typical message-driven object has the following characteristics:''' *Executes upon receipt of a single client message.
    644 bytes (92 words) - 17:12, 19 November 2004
  • A Botnet is a collection of hosts (bots) under a common command and control infrastructure [Wikipedia: [http://en.wikipedia. A host has to be compromised in order to install a bot on it. That can be done by exploiting known bugs and using standard too
    821 bytes (139 words) - 19:16, 14 November 2004
  • '''A typical session object has the following characteristics:''' *Executes on behalf of a single client.
    742 bytes (109 words) - 17:20, 19 November 2004
  • ...add all technical terms that you encountered during the seminar, including a verbose description of their meaning. Please keep those terms in an alphabe ...enuation denotes the loss of intensity a signal expieriences on its way to a reciever.
    1 KB (194 words) - 17:53, 11 July 2007
  • '''A typical entity object has the following characteristics:''' ...ive an exception if it calls an entity in a container that has experienced a crash.
    797 bytes (134 words) - 17:09, 19 November 2004
  • 1. Attacking '' '''one''' '' account (The intruder tries to guess a specific password)<br> 2. Attempt to penetrate '' '''any''' '' account (on a system) used to steal a service directly<br>
    759 bytes (118 words) - 20:54, 8 November 2004
  • ...s are sent by the Anonymization Layer. All commands and responses end with a single newline (<code>"\n"</code> in C). ; <tt>newuser <var>n</var></tt> : A new user with index <tt><var>n</var></tt> has been added. <br />No response
    2 KB (393 words) - 18:46, 25 May 2006
  • ...essed a computer system and what operations he or she has performed during a given period of time.<br><br>
    431 bytes (68 words) - 23:04, 8 November 2004
  • ...tle says that this is a book for Win32 programmers but it also gives quite a lot of information on concepts of the operating systems that implement the
    282 bytes (45 words) - 14:12, 10 April 2005
  • ...this number is coded in the following scheme with a word, let's say ''c-r-a-p'' supposed to be an easy reminder. | A | | | | | | | | | |
    3 KB (170 words) - 20:50, 8 November 2004
  • ...e does not contain any theoretical discussions of web services. It is more a You should really careful think about design before you should start coding a web service.
    1 KB (189 words) - 07:35, 9 March 2007
  • = Install OpenWrt on a Netgear WGT634U = ...ant to restore the original state later): '''Backup Settings''' -> '''Save a Copy of Current Settings''' -> '''Backup'''
    494 bytes (73 words) - 10:49, 8 March 2007
  • A frequent source of severe design errors can be fast built systems, develope ...sheer number of applications for which the average person is asked to use a password exceeds the powers of human memory
    1 KB (178 words) - 20:59, 8 November 2004
  • ...cessary binaries to bootstrap the system until you get a login program and a shell.<br> ...embedded systems the [http://www.busybox.net/ busybox] collection provides a huge set of common UNIX tools in one binary. This method saves some space o
    952 bytes (145 words) - 21:01, 19 September 2006
  • [[Image:Ddos.png|thumb|right|scheme of a DDoS attack]] ...ems are used for a [[Denial of Service]] attack. This scheme is similar to a [[Botnet|botnet]]. In fact, botnets are often used for DDoS attacks, but po
    2 KB (261 words) - 19:22, 14 November 2004
  • $ iptables -t nat -A PREROUTING -p udp --dport 53 -j DNAT --to 192.168.3.1:53 $ iptables -t nat -A POSTROUTING -d 192.168.3.1 -p udp --dport 53 -j MASQUERADE
    888 bytes (134 words) - 11:18, 11 January 2007
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 08:56, 8 February 2005
  • *[[A session object]] *[[A message-driven object]]
    339 bytes (40 words) - 16:17, 19 November 2004
  • .... Any topic. Affordable prices. Order 100% custom-written term papers from a reputable custom writing. Quality assistance from professional writers.
    506 bytes (72 words) - 14:33, 20 July 2010
  • A '''blind credential''' is a token asserting that someone qualifies under some criteria or has some stat ...is not using another's credential &mdash; identity theft &mdash; therefore a great deal of effort goes into the application of cryptography to authentic
    855 bytes (133 words) - 00:42, 8 March 2005
  • ...by disclosing the password to a third party by accident, on purpose, or as a result of deception?<br><br> 2. Will the user enter the password correctly (at least with a high probability)?<br><br>
    616 bytes (102 words) - 19:21, 8 November 2004
  • ...llenge to get the BRN software for a new target platform you have to build a (cross) compiler.<br> A compiler translates a high-level programming language (like C or C++) into binary code for execut
    2 KB (259 words) - 12:27, 23 October 2006
  • '''Q:''' Why does VMware Server not autostart a VM? '''A:''' Have a look at the latest log file below /tmp/vmware-<username>/ and
    544 bytes (80 words) - 21:23, 3 May 2007
  • - Instead of (A^N)/2 it only takes A^(N/2) (A = alphabet of characters, N = number of characters used for the password)<b
    445 bytes (76 words) - 22:53, 8 November 2004
  • - Leads always to the used password but is a matter of time and compute power<br> - Total exhaust time is 968 or 252, the average effort for a search is half of this<br><br>
    643 bytes (102 words) - 23:30, 8 November 2004
  • The folder /src is a mirror and thus provides a better reliability (redundancy). If the master server breaks down we still Historically we had a ressource problem on the master server. To solve this we moved the folder /
    604 bytes (87 words) - 15:46, 21 October 2011
  • In a typical system, human users must authenticate themselves to a client through in general three possible ways:
    779 bytes (109 words) - 19:09, 8 November 2004
  • - A program running in the background in a public terminal room<br>
    345 bytes (51 words) - 10:19, 17 May 2006
  • You need a Linux system with approximately 1GB free disk space to download and compile ===What is a toolchain?===
    1 KB (211 words) - 19:36, 22 February 2006
  • ...a different password each time authentication is needed and to never reuse a used password. Also it must not be possible to easily compute yet unused pa # Systems based on a non-inversible function, e.g. cryptographically secure hash functions
    3 KB (448 words) - 00:53, 6 November 2004
  • ...e Macronix 29LV320CVBC-90G Flash] chip. The ethernet ports are provided by a [http://www.delta.com.tw Delta] LFE8782 transformer. There are no obvious i ...om/release_notes/d103016.asp firmware page] also describes how to download a new firmware via TFTP. [http://openwrt.org/ OpenWRT] does not [http://wiki.
    2 KB (345 words) - 05:06, 6 February 2007
  • A composition of the topic can be found [[Properties of the Wireless Medium | ...in.de/~beier/pdfs/brn-06-802.11%20Network%20Structures.pdf presentation as a pdf].
    882 bytes (132 words) - 20:29, 17 October 2006
  • ...p://www.glink.com.tw/pdf/GLT5640L16-R3.3.pdf G-Link GLT5640L16-6TC], Flash a 2 MByte [http://www.spansion.com/products/Am29LV160B.html AMD/Spansion AM29
    1 KB (189 words) - 07:51, 28 January 2007
  • ...elieved that fingerprints posess the two requirements necessary for use as a biometric criterion: ...s ever share exactly the same pattern. What is more: experience shows that a small amount (usually 12 to 18) of minute details (minutiae, see below) are
    810 bytes (119 words) - 07:49, 3 March 2005
  • ...ed time budget to read books. In order to learn as much as possible about a subject XYZ, which books should I read? (I can't read them all due to lack A: Obviously, I do not know the books yet.
    1 KB (219 words) - 09:11, 26 January 2006
  • Simple flooding algorithms simply forward a packet several times to increase the possibility that the packet will reach it's destination in a certain time interval or
    3 KB (432 words) - 08:59, 20 October 2006
  • The purpose of the XML Schema language consists in a XML document’s validation. Thus, you can create application specific cons ...and separate elements in the document. The attribute xmlns indicates, that a namespace declaration follows:
    3 KB (397 words) - 23:33, 24 January 2005
  • ...put ejb-jar file is either a deployment unit intended for the Deployer, or a partially assembled application that is intended for another Application As ...and Application Assembler may be the same person or organization. In such a case, the person or organization performs the responsibilities described bo
    1 KB (181 words) - 10:39, 17 May 2006
  • - Carriage return bug after a wrong password entry<br> - Using shadow passwords (encrypted passwords hidden in a private file)
    502 bytes (80 words) - 22:58, 8 November 2004
  • Aradial is a high performance RADIUS server with Tier 1 levels of reliability and scalab a multitude of pre-configured settings that support most Access Servers in th
    1 KB (160 words) - 07:55, 3 April 2005
  • - NCC-1701D is not a good choice<br> - A password which seems to be a random combination<br>
    2 KB (292 words) - 21:54, 8 November 2004
  • ...nologies. It has been founded in 2001 by Sun and several partners to build a decentralized and open alternative to the centralized and proprietary Passp ...the use of [http://www.swig.org/ SWIG]. Closely related to LASSO is SOUK, a Python framework that uses LASSO and actually implements the Liberty Allian
    2 KB (248 words) - 10:36, 6 October 2011
  • Today there exist a lot of projects worldwide, using the WLAN-Technology, to realize wireless o also exist some research projects with a academic or commercial background.
    3 KB (398 words) - 01:24, 11 June 2005
  • ...hieves a better worst-case delay performance than existing approaches with a fixed overhead. ...n more detail, if an erasure code has a message of size <math>M</math> and a replication factor <math>r</math> as input, it produces <math>M*r/b</math>
    2 KB (423 words) - 09:01, 20 October 2006
  • because in case of, e.g. a raid this would compromise the users' anonymity. # The user sends his authentication information along with a new public key PK1 to an identity provider. The identity provider must know
    2 KB (364 words) - 21:55, 31 October 2006
  • A PKI consists of a Registration Authority (RA) and a Certification Authority (CA). At the following Picture you can see how a signed certificate is generated.
    1 KB (194 words) - 22:34, 18 January 2005
  • ...sses to share memory. Sharing memory for two processes means that there is a region of memory which both processes can access (read/write) such that bot ...his region starts at address MA, in Process B it starts at address MB. Let A write the value 0x23 to MA+4, that is, 4 bytes into the shared region. Then
    2 KB (265 words) - 20:44, 10 April 2005
  • ...rner-Allen, Johnson, Ruiz, Lees, Welsh: Monitoring Volcanic Eruptions with a Wireless Sensor Network [http://earth.unh.edu/johnson/PAPERS/ewsn.pdf] * Werner-Allen, Lorincz, Ruiz, Marcillo, Johnson, Lees, Welsh: Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, acce
    2 KB (261 words) - 09:08, 25 January 2006
  • SETI (Search for Extraterrestrial Intelligence) is a scientific area whose goal is to detect intelligent life outside of earth. To our knowledge such signals do not exist naturally. A discovery of those should therefor be caused by extraterrestrial technology
    1 KB (216 words) - 14:42, 31 October 2005
  • - Keeping a plaintext file of passwords is dangerous<br><br> - Entry is encrypted and only if the value matches a stored one, the login is accepted<br>
    476 bytes (76 words) - 23:08, 8 November 2004
  • to a consecutive log before the data write. If a crash occurs during the write,
    3 KB (486 words) - 15:07, 4 May 2007
  • Click is a modular software router developed by MIT. * Flexible control of parallelism in a multiprocessor PC router ([[Media:Click-paper.pdf|PDF]])
    623 bytes (80 words) - 21:22, 5 April 2005
  • An attack, where the hacker will extract the password directly from a person, who is authorized to access it by telling some plausible untruth is ...'. Insurance investigators for example often pretend on a phone call to be a desired victims doctor, so that they will get information concerning the vi
    994 bytes (159 words) - 19:35, 8 November 2004
  • ''Secret Sharing'' is used to split a secret (usually a key) into several pieces which are then given to distinct persons so that s == A Simple Approach ==
    3 KB (454 words) - 13:15, 1 December 2004
  • - A Dictionary Attack can be used, if a password file can be accessed (system can run tests offline)<br>
    540 bytes (86 words) - 23:12, 8 November 2004
  • static void swap_byte(unsigned char *a, unsigned char *b); static void swap_byte(unsigned char *a, unsigned char *b)
    2 KB (171 words) - 10:32, 31 October 2006
  • ...eless routers] - called Meraki mini - are currently available only through a beta program. ...m/products/partdetail?part=MT48LC16M16A2P-75 MICRON MT48LC16M16A2P-75] and a 8 MByte [http://www.sd.com SD] Flash. [http://www.realtek.com.tw/products/p
    2 KB (360 words) - 07:29, 11 April 2007
  • BitTorrent is a Peer2Peer filesharing protocol. It was designed in 2001 by Bram Cohen, to r ...belong to one file are named in a so called '''torrent-file''', which is a meata data file also containing the hash cheksums for each piece and additi
    4 KB (680 words) - 14:41, 19 July 2007
  • ...nsparent switch for it's participants. It is my goal to make it useable as a variable multi-switch. Encryption and authentication will be added to secur * List of standard/basic papers a ''person skilled in the art'' should have read.
    2 KB (319 words) - 21:20, 30 January 2006
  • = Creating a Standard Development Environemnt = ...ory buildroot and copy the necessary files into it. You can choose between a tarball or filesystem image, which can be loop mounted into your running Li
    2 KB (269 words) - 13:49, 8 September 2006
  • ...e OpenMoko is built on top of OpenEmbedded). In order to do this we create a new directory tree <code>openmoko-sar</code> next to <code>oe</code> and <c ...-devel-image.bb</code>. At a later time we plan to put this structure into a version control system.
    2 KB (265 words) - 03:12, 12 July 2007
  • ...ombinations of letters, signs and numbers used to authenticate one user on a system.<br><br> <br><br>A further introduction is available [[Passwords - Introduction|here]].
    657 bytes (100 words) - 18:44, 8 November 2004
  • This is about getting a mesh node to act as a internet gateway. There are different procedures for user- and kernel space ...g devices, doing NAT, ...) can be discussed separately. Especially we need a mechanism to detect, if we have internet connectivity.
    2 KB (310 words) - 09:52, 25 January 2006
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • * List of standard/basic papers a ''person skilled in the art'' should have read. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    862 bytes (118 words) - 17:16, 6 December 2005
  • ...ization und functioning of the METRIK testbed network. It's supposed to be a first guide for developers and scientists who do experiments on this networ The main purpose of the testbed network is to serve as a real-world scenario for testing and experimenting. In order to do that we u
    2 KB (212 words) - 11:41, 8 May 2013
  • In May 1999 Windows and MAC version were released and within a week 200.000 people downloaded and installed the client. ...e classic client) had 232.420 users with 494.090 computers. There is still a migration from the classic client (as described here) to the new BOINC clie
    1 KB (156 words) - 14:43, 31 October 2005
  • '''JavaBeans''' is a client-side component model. It is intended to be used for
    138 bytes (20 words) - 16:20, 11 November 2004
  • '''Bugs''' are errors that are done at the implementation level. A well known example are buffer overflows. A very good description of buffer overflows has been written by Aleph One "Sm
    2 KB (283 words) - 12:24, 25 January 2005
  • ** Difference in fulfilling a request * Used bandwidth for fulfilling a request (number of packets or bytes?)
    1 KB (162 words) - 10:04, 27 January 2006
  • ...P or serial connection. At first we have to build both a debugger stub and a cross-debugger (note that the host debugger which is shipped with the linux ...fy an executable which is load or attach it to a running process. To debug a process with PID 333 for example, simply type
    3 KB (447 words) - 10:57, 22 April 2007
  • so that every write creates a consistent state. On a typical file system there are files, directories and pointers to these.
    3 KB (524 words) - 15:04, 4 May 2007
  • ...ich an entity attempts to confirm that another entity is allowed to access a resource. For example, it is often desirable to grant access without requiring a unique identity. Familiar examples of [[authorization token]]s include keys
    2 KB (288 words) - 00:35, 8 March 2005
  • ...mplex the user might have problems entering it correctly and especially in a case of urgent (or safety) operations this would be not useful.<br><br> ...mple:'' South African Prepaid Electricity with 20-digit numbers – although a third of the population is illiterate, entry errors were the major problem
    695 bytes (107 words) - 20:47, 8 November 2004
  • This task requires knowledge in C/C++ and to a certain amount working with the compiler tools lex/flex and yacc/bison. There you find examples of working flex/bison code too and a makefiles.
    929 bytes (149 words) - 11:59, 19 April 2005
  • [[Image:Brn.Gui-500Nodes.png|none|right|thumb|400px|Brn.Gui running a simulation with 500 nodes.]] ...in simulation code via the Brn.Measure framework. Furthermore, it is also a result browser for already completed simulations which were executed by the
    3 KB (498 words) - 14:24, 16 March 2008
  • ...uler of the world *harharhar*. Some of these are presented here. There are a lot more techniques used that are not presented here.
    1 KB (190 words) - 11:25, 30 January 2005
  • ...antenna will be connected to the WRT54GS through a cable, which is called a pigtail. The pigtail has two connectors: One that connects to the WRT54GS, ...can be used, but try to keep their length and the number of connectors at a minimum as they all reduce the strength of the received/transmitted radio s
    1 KB (175 words) - 19:07, 11 March 2005
  • With one-bit complex sampling this yields a frequency band of 2.5 MHz which is enough to handle doppler shifts for rela ...ted via the Internet to the clients. The client program computes a result (a set of candidate signals) and returns it to the server. As mentioned in the
    3 KB (547 words) - 14:42, 31 October 2005
  • .../wndw.net/pdf/wndw-ebook.pdf Wireless Networking in the Developing World], A practical guide to planning and building low-cost telecommunications infras * Pentland A, Fletcher R, Hasson A. [http://www.firstmilesolutions.com/documents/DakNet_IEEE_Computer.pdf DakN
    1 KB (193 words) - 13:56, 3 March 2006
  • * MSC Tracer provides on-line behaviour of a Click router embedded NS2 simulator. [[Image:Brntracer.png|thumb|250px|Desc
    152 bytes (22 words) - 11:46, 21 November 2006
  • * the abbreviation for '''S'''imple '''O'''bject '''A'''ccess '''P'''rotocol The protocol serves as a distributed object protocol such as RMI or CORBA-IIOP. Thus, whereas RMI is
    5 KB (753 words) - 00:09, 25 January 2005
  • ...atest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and
    1 KB (159 words) - 14:39, 18 June 2005
  • <dt>User management</dt> <dd><ul><li>RP has a database with two unrelated tables: <ul><li>UserIDs and accompanying data</ ...fusing creation if this is the case (counters Sybil attack)</li><li>Create a new UserID and enter it into the database; at the same time enter the realn
    4 KB (699 words) - 01:57, 13 May 2006
  • ...ew routing technologies or the extension of existing VoIP technology (e.g. a SIP extension) MAY result from this work, development of new VoIP technolog * If successful, this contribution will allow to give a statement whether VoIP in current mesh networks is possible, and if not, wh
    2 KB (311 words) - 08:51, 23 April 2006
  • ...ization und functioning of the METRIK testbed network. It's supposed to be a first guide for developers and scientists who do experiments on this networ The main purpose of the testbed network is to serve as a real-world scenario for testing and experimenting. In order to do that we u
    2 KB (238 words) - 20:08, 1 November 2012
  • ...ions are special [[one way functions]] that can be easily inverted knowing a secret or trapdoor.
    157 bytes (22 words) - 09:29, 8 February 2005
  • ...hardships on peers with slow links and those holding many unpopular files, a rule was established which gives uploading more points than downloading. Fu ...rg/events/worlds04/tech/full_papers/yang/yang_html/maze.html Deployment of a Large-scale Peer-to-Peer Social Network]
    1 KB (201 words) - 18:19, 26 July 2007
  • ...f concept] of the [http://www.dtnrg.org DTN research group] views a DTN as a network of networks, as some sort of overlay on top of other nets, being ab ...ocator'' a node belonging to this network. Note that addressing ''within'' a region/network can be completely different, it's up to the network how this
    4 KB (650 words) - 16:18, 18 July 2006
  • * [[DistSim|DistSim]] is a framework for defining, executing and collecting the results of multiple si
    155 bytes (20 words) - 15:16, 16 February 2007
  • ...f Trust between peers is measured in a Matrix M. This N * N matrix defines a one-step rank among peers. ...normalized download volume that a peer i has received from a peer j during a period of time.
    3 KB (412 words) - 16:00, 5 August 2007
  • ...://www.hu-berlin.de/ Humboldt University Berlin]. The goal is to construct a network of nodes (access points) which share Internet access over wireless ...nges and higher data rates, as soon as such equipment becomes available at a reasonable price.
    4 KB (597 words) - 12:28, 21 November 2006
  • The container provides a runtime-environment for an enterprise bean and offers services, like contai As a result the bean depends on the container in every aspect. There are three w
    9 KB (1,399 words) - 06:32, 23 February 2005
  • ...sin for writing programs that run on unused workstations, typically within a single organization. ...cientific research and the creation of global communities centered arround a specific scientific interest.
    3 KB (449 words) - 14:51, 31 October 2005
  • ...erent implementations: RMI/[[JRMP]] commonly just referred to as "RMI" and a [[CORBA]] compliant implementation called RMI-[[IIOP]]. When the client invokes a remote method a so called stub on the client side marhalls the invokation and sends it to t
    5 KB (747 words) - 06:56, 11 April 2005
  • ** USB-A socket ''The enclosure can be opened by pressing the brackets with a slotted screwdriver '''towards''' the device.''
    2 KB (348 words) - 08:58, 7 March 2007
  • ...project - especially by adding code for OpenWRT - feel free to ask us for a CD with the WRT Standardized Development Environment (in short WRTSDE), whi ...create a new empty directory, which will later contain a complete copy of a Linux installation - the WRT standardized development environment.
    2 KB (282 words) - 08:30, 8 February 2005
  • ...shower. Creating a scale map of your bed room, living space, or kitchen is a great way to study about drawing maps. The home was found at 10050 Cielo Dr
    4 KB (632 words) - 19:44, 2 December 2012
  • ...be setup in the city of Berlin and whether such a network can be build in a completely self-organizing/self-configuring way. The Berlin Roof Net projec A community network must be usable for inexperienced end users; thus self-org
    3 KB (412 words) - 08:08, 18 November 2010
  • Unfortunately there is a big dilemma dealing with passwords as described by Kaufman, Perlman and Spe A simple way to test passwords on their own security is issued by the DSB Zü
    1 KB (242 words) - 19:00, 8 November 2004
  • ...Service Providers, though it may as well be used on any network that needs a centralized authentication and/or accounting service for its workstations. Radius supports a wide variety of authentication schemes. A user supplies his authentication data to the server either directly by answ
    2 KB (378 words) - 13:52, 10 April 2005
  • ...Service Providers, though it may as well be used on any network that needs a centralized authentication and/or accounting service for its workstations. Radius supports a wide variety of authentication schemes. A user supplies his authentication data to the server either directly by answ
    2 KB (378 words) - 13:53, 10 April 2005
  • ...nd credential]], in contrast, does not establish identity at all, but only a narrow right or status of the user or program. ...lled by insisting on an authentication procedure before access is granted. A few examples are given below.
    5 KB (725 words) - 05:10, 31 August 2005
  • ...ovider’s tools. A client never references an entity bean instance directly—a client always references an entity EJBObject or EJBLocalObject whose class ...related entity bean never references another entity bean instance directly—a related entity bean, like any other local client of an entity bean, always
    2 KB (304 words) - 13:17, 1 December 2004
  • ...ularly use the Project Seminar to report progress in each topic, following a fixed schedule - one topic / day, repeating the series after 4 weeks. #* Responsible: A. Zubow, M.Kurth
    3 KB (377 words) - 10:32, 21 July 2006
  • > update add testabcdef.sar.informatik.hu-berlin.de 300 A 127.0.0.1 > update delete testabcdef.sar.informatik.hu-berlin.de A
    1 KB (138 words) - 21:33, 22 February 2006
  • Also have a look at:
    305 bytes (50 words) - 09:24, 16 June 2006
  • '''A:''' Check out the latest click configuration from https://sarforge.informat
    427 bytes (56 words) - 10:57, 10 January 2007
  • It is sometimes viewed as a concept separate from software reliability. (Note that the separation betwe ...rity as an aspect of software dependability. After all, the reliability of a system can be defined as
    4 KB (569 words) - 16:14, 5 July 2005
  • ...ularly use the Project Seminar to report progress in each topic, following a fixed schedule - one topic / day, repeating the series after 4 weeks. #* Responsible: A. Zubow, M.Kurth
    3 KB (389 words) - 05:50, 12 March 2007
  • be tested and fulfil several specifications. Sometimes a framework to solve an issue if you can teach a developer about a framework
    5 KB (839 words) - 11:51, 13 April 2007
  • ...DART satisfies the following properties which can be seen as guideline for a scalable and efficient solution: Using dynamic addressing and appropriate routing, DART is a promising approach for achieving scalable routing in large ad hoc networks.
    7 KB (1,035 words) - 08:24, 9 October 2007
  • :A user registers a number of spam-accounts to download from his main-account. Thus he transfer ...d to normalized download volumes that ''i'' has received from ''j'' during a certain time period. In order to increase its local view of reputation, eac
    4 KB (565 words) - 10:09, 30 July 2007
  • as transmission medium to build a local area network. It also includes an infra-red technique for data-transm a group of stations communicating through an ''access point'' (AP),
    3 KB (465 words) - 13:34, 10 February 2005
  • :A user registers a number of spam-accounts to download from his main-account. Thus he transfer ...d to normalized download volumes that ''i'' has received from ''j'' during a certain time period. In order to increase its local view of reputation, eac
    4 KB (567 words) - 16:31, 5 August 2007
  • '''Social Engineering''' is a type of non-technical retrieval of confidential information or gain of acce *faking authorities like administrators, members of a certain company,...
    2 KB (312 words) - 20:21, 14 November 2004
  • The ARM4FS proof of concept programs are written in Python and kept in a SVN repository. You can check them out with ...l (Debian: <code>python-pyopenssl</code>, Gentoo: <code>pyopenssl</code>), a recent SVN version of [http://sandbox.rulemaker.net/ngps/m2/ M2Crypto], SQL
    2 KB (337 words) - 10:57, 6 June 2006
  • '''A certification path''' is a sequence of n certificates where: (a) a certification path of length n;
    7 KB (980 words) - 15:00, 16 December 2004
  • ...r nodes in the broadcast area and can be decoded at the next node. This is a simple version of mixing multiple unicast, adopted to the properties of the List of standard/basic papers a ''person skilled in the art'' should have read.
    4 KB (529 words) - 00:44, 14 February 2006
  • * I want a mesh node to ** determine, if it has a (local) internet connection
    6 KB (1,036 words) - 09:40, 27 March 2006
  • ** Difference in fulfilling a request * Used bandwidth for fulfilling a request (number of packets or bytes?): global, per Client
    2 KB (209 words) - 11:49, 27 February 2006
  • BOINC (Berkeley Open Infrastructure for Network Computing) is a Middleware for public resource computing projects developed at the Space Sc Each project is identified with a single master URL, which describes the project and provides registration, c
    4 KB (670 words) - 13:11, 18 November 2005
  • Have a look at: [[Serial console]]
    254 bytes (38 words) - 09:59, 11 September 2006
  • The build process to get a ready-to-run BRN software package is described in general and examples are ...u will need a cross-compiler, which runs on your development machine (e.g. a x86 Linux system) and creates binary code for the target platform. Read the
    5 KB (725 words) - 07:08, 13 March 2007
  • ...to destination as the packet moves through the network instead of choosing a pre-determined route ahead of time. Through this improvement the performanc ...e standard MAC Protocol has to be modified. And in second every node needs a Delivery-Ratio-Matrix to decide which node would be the best receiver.
    6 KB (939 words) - 20:46, 31 July 2007
  • ...oofing relies on the forgery of the sender-address in ip-headers. Although a quite simple attack, it can be very effective. This attack overwhelms all s ...o known as ARP-Poisoning) is a spoofing technique that can be performed in a local area network. To understand this approach, we'll have to look at the
    6 KB (1,001 words) - 19:41, 13 December 2004
  • ...tory. For Java publishing, the Java API for XML Registries (JAXR) provides a standard way to access business registries and share information.
    979 bytes (141 words) - 07:30, 8 February 2005
  • What is [http://openwgt.informatik.hu-berlin.de/ OpenWGT]? OpenWGT is a Linux distribution designed to run on Netgear's WGT634U ''Wireless Media Ro OpenWGT intents to be compatible to [http://openwrt.org/ OpenWRT] (a distribution for the Linksys WRT54G(S) broadband router).
    4 KB (541 words) - 19:21, 15 December 2005
  • ...l traits used to recognize the identity, or verify the claimed identity of a person. ...text of [[Security Engineering]] there are traditionally two links between a person and her identity:
    6 KB (974 words) - 06:50, 23 February 2005
  • ...experimental code, coordinated start of the experiment, switching back to a state known as working and collecting and analyzing the test results. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    2 KB (252 words) - 16:31, 26 January 2006
  • To easiest way to run a BRN meshnode is to use a modified Netgear WGT634 [[Hacking_the_Netgear_wgt634u|Netgear]] router prel # '''Install''' a prepared '''image''' file as described [[BRN:Software:OpenWrt_Installation|
    3 KB (486 words) - 18:00, 25 February 2008
  • ** A filesystem is a basic service for many applications on top. It can be used for class- and u ** A basic distributed (high-performance) filesystem, using only the [[T-07S-04|
    2 KB (321 words) - 17:17, 30 July 2007
  • ...y to cellular networks, where the nodes are restricted to communicate with a set of carefully placed base stations, in wireless ad hoc networks there ar * [[Tribler: A social-based Peer-to-Peer System]]
    2 KB (236 words) - 15:23, 5 August 2007
  • ...=262131&type=pdf Bennington, Bartel - Wireless Andrew: Experience Building a High Speed, Campus-Wide Wireless Data Network, International Conference on
    649 bytes (78 words) - 12:10, 8 March 2007
  • *<math>E</math> is a vector over <math>P</math> corresponding to a source of rank and is chosen such that <math> \sum_{u \in P} E(u) = 0.15</m ...h>c\sum_{v\in N^{-}(u)} {R(v)\over{|N^{+}(v)|}}</math> gives rank value as a function of hyperlinks pointing at <math> u </math><br>
    5 KB (1,111 words) - 08:28, 28 February 2006
  • ...from the Tuxap project and is slightly outdated by now. Here's how to get a more recent kernel up and running: # Get a new kernel (I'll go with 2.6.16) from kernel.org (I used linux-mips.org, bu
    4 KB (574 words) - 11:00, 13 May 2006
  • There you should create a script called env.sh adapting this content to your paths. This assumes the cp -a click/elements/wifi/*.hh staging_dir/bin/include/elements/wifi/
    3 KB (565 words) - 09:14, 31 January 2006
  • ...Virtual Private Server is user-friendly and much simpler to maintain than a dedicated server, thanks to our Hepsia Website Hosting Control Panel, featu ...resence. You will have under your control a whole stand-alone server, with a robust hardware components and stable network characteristics.
    5 KB (734 words) - 15:50, 17 April 2013
  • ...from scratch, losing all your preferences and possibly some work and also a lot of time in the process. '''subinacl''' comes to the rescue! You need to be a local administrator (at least, though domain administrator will probably wo
    4 KB (665 words) - 13:58, 21 February 2006
  • "Monarch" Paper: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protoco 50 nodes in a 1500m x 300m area.
    2 KB (340 words) - 11:41, 4 November 2004
  • ...ich conditions can be improved and whether the use of EDCA is desirable in a mesh network. ...een implemented in the wild. There seems to be no evalutaion of its use in a mesh network.
    2 KB (324 words) - 14:18, 19 June 2007
  • ...assembly information describing how the enterprise beans are combined into a We say that a jar file contains a second file “by reference” if the second file is named in the Class-Pat
    4 KB (580 words) - 09:04, 8 February 2005
  • *They can (even without having a real payload) damage binaries, because they fail to insert their code corre *Not every virus has to have a payload, there are viruses that exist just to spread.
    4 KB (650 words) - 12:32, 13 June 2005
  • ...l as well with various encryption methods one might call the tunneled data a '''virtual private network'''. This is used in various scenarios, mostly fo ...P is used to tunnel the PPP-protocol over IP-networks. It is realized with a Client-Server architecture and works on two logically seperated channels: O
    4 KB (686 words) - 13:49, 14 September 2005
  • ...adhoc networking are still the same as 30 years ago, so it is worth having a look on the first solutions which finally led to what we know as wireless n ...s to mobile hosts and terminals, and to provide computer communications in a mobile environment.
    5 KB (660 words) - 14:05, 3 December 2004
  • A log-structured filesystem is a novel disk storage management technique developed in the late 1980's by Joh ...(with read operations this overhead can be ''cached away''). When writing a file the data blocks are written first, then the inode of the file, then th
    7 KB (1,157 words) - 15:04, 1 February 2007
  • * A. Zubow ...ions in wireless multi-hop networks by opportunistically skipping nodes in a packet’s forwarding path. The use of multiple non overlapping RF channels
    4 KB (532 words) - 18:33, 9 November 2006
  • A '''Denial of Service''' attack (abbr. DoS) tries to '''block or restrict a certain resource or service''' (typically available on the internet). This ...blocking any services that are available to the public (e.g. a computer in a library) can be titled "Denial of Service".
    6 KB (946 words) - 19:29, 14 November 2004
  • ...uestion what infrastructure is necessary to provide a city-toll-system for a city like berlin for example.
    2 KB (263 words) - 19:32, 12 December 2007
  • The model is shipped with vanilla JiST/SWANS. It is a special case of the Log-Distance Model with path loss exponent 2.0. ...or each transmission (the ns-2 approach). By setting the coherence time to a fixed positive value, the shadowing coefficient remains constant for the sp
    6 KB (854 words) - 13:23, 16 March 2008
  • ...cribed functionality. Still, the efficient implementation of a CDN remains a challange. ...he overhead, that is imposed by the user queries. The general structure of a CDN will be described later in this article. At this point it is important
    10 KB (1,668 words) - 15:23, 19 July 2007
  • ...unny or informative and some of them are profitable and all involve risks. A reputation system gives people information about others's past performance. ...Communications of the ACM, 43(12), December 20000, pages 45-48 ] (it gives a nice introduction what are reputation systems good for)
    7 KB (1,070 words) - 10:52, 7 May 2006
  • This article deals with the problems and solutions of trusting strangers in a network. ...Network where you are transacting with identities you don't know, you have a problem when you need to know whether you really get what you want or not.
    10 KB (1,629 words) - 11:50, 26 April 2006
  • ...ween SOAP 1.1, WSDL 1.1, XML and Java. The API provides both, a client and a server programming model. In order to access a web service from a client written in Java, three APIs have been made available.
    10 KB (1,458 words) - 13:29, 9 February 2005
  • You have to port a JVM into the Linux kernel. You can drop Click. We added a PrintWifi before ToDevice(wlan0) and got
    6 KB (858 words) - 12:10, 3 May 2007
  • adb shell - opens a shell on the emulated android phone<br/>
    226 bytes (40 words) - 14:43, 6 June 2008
  • It's best to generate two keypairs for each zone: a key-signing key (KSK) and a zone-signing key (ZSK). ...s transmitted to the parent zone as a designed signer or to the clients as a secure entry-point. If this key is rolled over all those parties will have
    7 KB (1,164 words) - 16:46, 13 September 2005
  • Use a 2048 or 4096 Bit RSA Key? It might be better to use ECC – the same streng ...icate's in parallel, so you can use a ECC-Certificate and in parallel have a fallback-certificate using RSA-signatures: <br />
    4 KB (645 words) - 16:03, 28 September 2013
  • '''Enterprise JavaBeans''' (EJB) is a standard server-side component model for the development and deployment of
    424 bytes (50 words) - 16:16, 11 November 2004
  • ...counts belonging to the same principal, usually on different systems. It's a core part of the [[Liberty Alliance]] specifications. ...nking system acts as the Identity Provider (IdP) while the forum system is a Service Provider (SP).
    1 KB (216 words) - 06:25, 31 August 2005
  • ...siness logic. The encapsulation of business logic into business objects is a common solution.
    288 bytes (42 words) - 14:02, 11 November 2004
  • is a common solution.
    294 bytes (42 words) - 13:49, 11 November 2004
  • * If no name is proposed the default name for a dynamicly assignd IP address 192.168.X.Y is set to dhcp-X-Y. ...ading 0 in the MAC-addresses are droped. Example: 00:0f:b5:3c:0a:17 -> wgt-a-17)
    2 KB (332 words) - 16:08, 18 November 2013
  • ...er, on computers with a compatible Trusted Platform Module (TPM), provides a way to validate the integrity of the startup components of the system befor ...ymmetric block cipher that works on fixed blocks, the block size is always a multiple of 16 bytes so no padding is necessary. BitLocker provides AES key
    7 KB (1,241 words) - 16:03, 20 June 2008
  • ...ally routing etc.) is not within our scope. We assume, that the BRN offers a way to transport data from one node to another. For a list of currently available thesis topics see [http://sar.informatik.hu-ber
    1 KB (216 words) - 15:35, 12 December 2005
  • ...someone else. Dangerous in this context is especially if the attacker lets a host believe he's the gateway. The Man in the Middle attack is a very powerful yet common attack pattern, it has therefore attracted the att
    1 KB (234 words) - 12:50, 4 January 2005
  • ...f network communication usually means the distribution of messages/data to a number of recipients. Broadcasting is a common technique to realize many network functions such as
    8 KB (1,194 words) - 12:28, 28 January 2005
  • across a network. The greatest advantage compared to remote procedure calls (RPC) is
    434 bytes (62 words) - 07:34, 17 November 2004
  • * Enterprise bean’s name. The Bean Provider must assign a logical name to each enterprise bean in the ejb-jar file. There is no archi * Session bean’s state management type. If the enterprise bean is a session bean, the Bean Provider must use the session-type element to declar
    6 KB (965 words) - 12:40, 1 December 2004
  • *Do you have a look at it before you compile it? *Do you have a look at the source code before you compile it?
    8 KB (1,426 words) - 16:04, 7 January 2005
  • * [http://citeseer.ist.psu.edu/garcia-martinez02cryptographic.html A Cryptographic Reputation Scheme for Peer-to-Peer Networks (Antonio Garcia-M ...ethods used for establishing trust in P2P applications. The document gives a survey of trust systems (policy based, reputation-based, social networks-ba
    6 KB (908 words) - 22:53, 6 February 2006
  • Es gibt genau dann eine Kante von knoten A nach B im Attestationsgraphen, wenn # A und B kommunizieren direkt miteinander.
    4 KB (533 words) - 17:08, 30 July 2007
  • It is interesting because the need for a good authorization framework/standard security domains without central trusted institutions. There are a lot of existing
    5 KB (758 words) - 21:55, 25 June 2007
  • ...particular, have a rich set of actors in this scene, who have accumulated a wealth of novel technologies, practical experience, and visions of future s This workshop will provide a unique forum (1) to capture the current state of affairs from the operator'
    3 KB (379 words) - 14:08, 4 April 2006
  • ...istributed object systems]] (based on ORBs) with the robust environment of a TP monitor.
    316 bytes (43 words) - 15:32, 11 November 2004
  • If this process led to a positive result, you can try to patch your kernel source tree with the '''c ...a linux kernel (vmlinux), which is able to load the '''click''' router as a linux '''kernel module''', also called ''linuxmodule'' later.
    2 KB (361 words) - 14:43, 9 November 2006
  • ...ipedia.org/wiki/Mobile_ad-hoc_network MANETs (mobile ad-hoc networks)] use a model, which is deviated from the wired model: Each pair of nodes is seen e ...s known from wired networks to be applied: Static routes are chosen before a packet is sent through the network. Unfortunately, this masks all the wonde
    10 KB (1,685 words) - 20:33, 14 December 2012
  • ...bly not hardened to protect against malicious attacks by other users (take a look at the published vulnerabilities of Unix and Windows).
    452 bytes (66 words) - 21:05, 8 November 2004
  • - Gazing at the screen through a narrow slot – your balance is private, but your pin is not<br><br>
    509 bytes (79 words) - 22:40, 8 November 2004
  • ** no need to block when performing a request * Create a JMS connection: Connection
    5 KB (555 words) - 12:45, 14 February 2005
  • There is a broad range of possible attacks, that can be used to
    421 bytes (68 words) - 22:26, 8 November 2004
  • ...ertheless there are some particular purpurses that you want to have signed a particular keypair e.g. resigning an uncompromized one which has been expir ...uest a new certificate by clicking "test."'''<br> Above the test button it a label saying "Developers of New Security Applications ONLY."
    7 KB (1,117 words) - 10:06, 15 March 2007
  • ...so use the web interface http://brn-svn.sar.informatik.hu-berlin.de to get a first expression. ...ions. These are releases known to work. Taking a release from there may be a good starting point, if you have trouble getting trunk to work.
    5 KB (774 words) - 10:44, 24 March 2006
  • ...ion to generate a sequence of [[One-Time Passwords]] from a passphrase and a system identifier or seed. There are several possible hash functions that c ...he additional two bits are used to store a simple checksum. An example for a resulting password would be <code>TORN ACID SAD VAN RUM BEN</code>.
    8 KB (1,413 words) - 03:02, 7 November 2004
  • * 1971 John Draper find out that a toy whistle from a Muesli box reproduces exactly the clay/tone that a free voice grade
    6 KB (872 words) - 21:31, 28 January 2005
  • * Models for IEEE 802.11b (DSSS) and a/g (OFDM) [[Image:Brn.Gui-500Nodes.png|none|thumb|left|400px|Brn.Gui running a simulation with 500 nodes.]]
    7 KB (983 words) - 12:36, 23 August 2008
  • ...t's like an earlobe; we all have one, but nobody really knows why. This is a little Web page I cooked up that explains the why. ..., but most systems do. I'm going to assume you "go with the flow" and have a fairly typical system.
    11 KB (1,939 words) - 09:12, 25 January 2006
  • ...Rewriter generates invalid code (A java.verifier exception will occur). So a best practise is to mark all concrete classes as final to prevent this erro * Since it is a discrete simulator, it is possible to schedule more than one event at exact
    4 KB (503 words) - 14:35, 2 March 2006
  • Routing is the process of determining a message path from source to target (which are not directly connected) using ''Distance Vector'' -- also known as Bellman-Ford or Ford-Fulkerson -- is a dynamic routing algorithm, meaning it dynamically determins the route for e
    8 KB (1,267 words) - 07:10, 18 July 2005
  • ...sses designed to lessen disastrous effects either before, during and after a disaster [11]. ...//earth.unh.edu/johnson/PAPERS/ewsn.pdf Monitoring Volcanic Eruptions with a Wireless Sensor Network]</b>
    5 KB (656 words) - 19:59, 4 February 2006
  • manage the entire environment of a business application, including transactions, resource management,
    551 bytes (73 words) - 15:54, 11 November 2004
  • [[Passwords - A Bad Mnemonic System| 4.1 A Bad Mnemonic System For Saving Bank Pins]]<br>
    2 KB (229 words) - 20:52, 8 November 2004
  • ...e conception and development of a software distribution platform (SDP) for a distributed network of nodes (usually WRT54GS or WGT634U). ** cross-compatible beginning with version 1.0.0 (e.g. allow update of a node running 1.0.0 with version 1.5.99)
    7 KB (1,053 words) - 18:39, 9 November 2006
  • ...rt of network attacks originates from its inside (Insiders know more about a systems architecture, protective measures etc.) * maybe a better name would be "Signature Compare System" or "Signature Compare Autom
    6 KB (934 words) - 04:13, 11 February 2005
  • ...nt an overview of available tools regarding each of these points. Finally, a sample application is developed to demonstrate how much work an IDE can do ==Choosing a J2EE-Server==
    10 KB (1,361 words) - 00:41, 17 December 2004
  • ** [[Receiver Anonymity by Incomparable Public Keys]] (based on a paper by ''Brent R. Waters, Edward W. Felten, Amit Sahai'' from 2003)
    576 bytes (64 words) - 18:44, 17 April 2008
  • The “Wireless Testbed Framework” is a set of tools to ease and automate testing and Our plan is to develop a modular framework which allows easy measurement of wireless links independe
    2 KB (317 words) - 16:23, 7 April 2008
  • ...other city by car. We need to figure out which way to take, we need to get a new route when something on our normal route is blocked, etc. ...t the beginning and it remains static till the end of the conversation. In a packed switched network (like the internet), each packet (chunk of informat
    11 KB (1,729 words) - 16:35, 30 July 2007
  • [[OpenSSL]] supports a great variety of strong encryption algorithms. To encrypt a file (e.g. document.txt) symmetrically with [[AES]]-256 just use:
    9 KB (1,342 words) - 12:51, 20 April 2005
  • == Frame exchange duration for a unicast data frame and the acknowledgement frame == There you can enter the length of the data packet as well as a few other options to calculate the expected transmission time. Also see the
    21 KB (2,272 words) - 11:12, 8 March 2007
  • ...the number of users increases. One major reason for that is the sharing of a single channel. ...en on one channel at a time, and so most protocols are designed to work in a one-channel environment.
    14 KB (2,372 words) - 13:42, 23 July 2006
  • As a result people choose either values that are easy for attackers
    524 bytes (82 words) - 20:48, 8 November 2004
  • Users of a public key shall be confident that the associated private The binding is asserted by having a trusted CA
    10 KB (1,517 words) - 21:27, 15 February 2005
  • ...y to cellular networks, where the nodes are restricted to communicate with a set of carefully placed base stations, in wireless ad hoc networks there ar
    2 KB (265 words) - 20:02, 13 April 2005
  • A '''server-side component model''' is an architecture for developing distrib
    529 bytes (61 words) - 15:25, 11 November 2004
  • used as a parameter to the --cipher option. The default changed with the --keysize directive. Using a CBC mode
    4 KB (677 words) - 13:42, 19 September 2016
  • [2] Armstrong, E., Bodoff, S., Carsen, D. e.a: The Web Service Tutorial, http://java.sun.com/webservices/docs/1.1/tutoria [4] Joshy, Joseph: A developer's introduction to JAX-RPC, Part 2: Mine the JAX-RPC specification
    975 bytes (132 words) - 08:40, 25 January 2005
  • ...nonymity'' means the ability to send one or more messages to a receiver in a way that nobody except the receiver can determine whom the message is inten ...nd encrypting messages with an asymmetric cryptosystem that is designed in a way to allow for the creation of many different public keys (''Incomparable
    14 KB (2,342 words) - 15:10, 30 July 2007
  • The Reputation Provider acts as a server and listens on port 2323. ...only be possible to protect against active attacks (man in the middle) if a trust relationship has already been established, e.g. the client knows the
    15 KB (2,062 words) - 04:25, 19 June 2006
  • There is a high probability and even if the users are given (unchangeable)
    640 bytes (100 words) - 22:02, 8 November 2004
  • A reduction in the power consumption increases the operational lifetime of ne PARO is a power-aware routing technique for wireless ad hoc networks where all nodes
    9 KB (1,431 words) - 14:39, 8 February 2005
  • |built-in virtual memory and large memory segments, treated as a 32-bit flat-address machine *today a comeback in the form of public key certificates
    4 KB (512 words) - 00:43, 8 September 2005
  • But unfortunately the mount of a service denial attack comes along with this and especially if the service i
    597 bytes (93 words) - 21:12, 8 November 2004
  • with OpenVPN. Each cipher shown below may be use as a --keysize directive. Using a CBC or GCM mode is recommended.
    5 KB (717 words) - 12:14, 18 September 2018
  • ...mena appearing in the field of wireless networking, it is possible to gain a deeper understanding of the inherent characteristics and therefore the chal To answer these questions a group of researchers carried out a case study based on an existing urban wireless network, the MIT RoofNet.
    9 KB (1,491 words) - 14:24, 18 July 2007
  • beans are combined into a single application deployment unit. ...es how the enterprise bean (or beans) in the ejb-jar file is composed into a larger application deployment unit. Providing assembly information in the d
    2 KB (296 words) - 12:14, 1 December 2004
  • ...h routine will only download and flash a maximum of 4194304 bytes (4MB) at a time. To get around the 4MB limit, we need to split the image into smaller
    2 KB (265 words) - 10:59, 13 June 2007
  • ...less networks but in all kind of multihop networks, which are organised in a peer-to-peer manner. So this has '''nothing''' to do with the interference Intuitively, one could think that the more nodes join a wireless peer-to-peer net, the more capacity is available to each node. Thi
    9 KB (1,571 words) - 11:02, 8 February 2005
  • This is a list of operating mesh nodes (testbed@testbed:/testbedhome/testbed/helper/m
    630 bytes (90 words) - 16:21, 19 November 2010
  • - Disregarding case-sensitive causes a much lower possibility and shorter recognition time<br>
    637 bytes (100 words) - 23:32, 8 November 2004
  • ...ironment, and public health - Strategies to improve the quality of life in a sustainable way=
    669 bytes (87 words) - 13:13, 17 March 2006
  • ...orks are generally insecure due to physical reasons: the reception area is a sphere around the sender, therefore traffic is by default public to everyon According to a paper by Erik Tews, Ralf-Philipp Weinmann and Andrei Pyshkin of the Technic
    11 KB (1,784 words) - 12:30, 28 June 2007
  • This is a list of possible topics for scientific work ("Dissertationen", "Diplom"- or ...os hardware. Goal of the project is to test various proposed algorithms in a real testbed, and develop new ones.
    9 KB (1,371 words) - 23:21, 30 August 2008
  • Sensor networks can become useful in a variety of applications: *Energy management: We can achieve a better management through optmizied distribution depending on the ambient a
    13 KB (2,182 words) - 10:39, 22 February 2005
  • ...l nodes is the challenge. There are different selection schemes, which are a result of various approaches. A successfull transmission requires a signal-to-noise ratio greater than a specific threshold, which is closely related to the bit error rate:
    8 KB (1,281 words) - 20:51, 13 April 2005
  • define which station is allowed to transmit at a given time. <br>
    736 bytes (105 words) - 22:39, 1 December 2004
  • ...ss is a minimal simulation utilizing the OR-Mapping library. See below for a short description. * models with a "hello world!" example.
    5 KB (533 words) - 11:30, 19 February 2007
  • ...user can be confident that he uses the assumed service and not the one of a malicious third party. ...st importantly to optimize the operation (there's no sense in establishing a full IP connection with ZeroConf etc. when it can be determined at the Blue
    9 KB (1,523 words) - 14:38, 17 November 2005
  • [http://boinc.berkeley.edu/grid_paper_04.pdf [2]] David .P. Anderson. “BOINC: A System for Public-Resource Computing and Storage”. 5th IEEE/ACM Internati
    1 KB (142 words) - 16:59, 5 December 2005
  • Ns-2 is a discrete event simulator targeted at networking research. The existing 802.11 support in ns-2 is disapointing for a number of reasons.
    3 KB (471 words) - 07:43, 5 June 2007
  • $> nmap -A 192.168.188.22 This module lists a directory on a set of printers using the Printer
    15 KB (2,085 words) - 07:21, 17 October 2017
  • ...lts and references to the code used to perform the simulations are kept in a central MySQL data base, so that little manual organization of data is requ * The '''simulation wrapper''' is a small program running on the hosts intended to execute the simulations. It
    13 KB (2,219 words) - 17:01, 25 February 2008
  • * Des-Files contain a gross description for the experiment. E.g.: Duration of the experiment; Dir This script executes a group of click-scripts (located in click-brn-scripts) for testing and start
    2 KB (358 words) - 08:37, 2 August 2012
  • ...w of the solutions presented so far on how to secure the handshake against a quantum adversary. ...fically, the message must not be readable by a server operator that is not a conversation participant.
    13 KB (1,927 words) - 13:56, 24 October 2023
  • Excerpt from Lacage, IEEE 802.11 Rate Adaptation: A Practical Approach, 2004. "A complete Linux driver for the AR 5212 chipset is available
    6 KB (896 words) - 11:21, 22 December 2009
  • ==How to get Rev information into a TeX-source using svn==
    891 bytes (139 words) - 09:16, 16 February 2007
  • ''HTTP'' is a widely used application-level protocol in the web and was used since 1990. The new ''HTTP'' version addresses a number of issues present in previous versions:
    9 KB (1,370 words) - 11:36, 5 March 2019
  • ...and find something strange, then please go on and either ''edit'' or leave a ''comment''. ...ld be done using commercial off-the-shelf hardware, where we do have no or a very limited access to the MAC layer.
    10 KB (1,523 words) - 08:57, 28 July 2007
  • ::Angenommen, dass ein Kontakt zwischen den Knoten A und B ansteht. Knoten befördern Nachrichten wie folgt: ::Für jede Nachricht m, die im Knoten A gespeichert ist, wird A versuchen sie dem Knoten B genau dann zu übertragen, wenn der
    4 KB (563 words) - 12:33, 4 November 2007
  • ** [http://code.google.com/android/devel/implementing-ui.html Implementing a User Interface]
    2 KB (281 words) - 21:18, 14 September 2008
  • From outside this should be look like a local web directory. # Create in the IIS MMC a virtual directory [[Image:rproxy_2.png]]
    4 KB (540 words) - 11:54, 13 December 2006
  • TrueCrypt is a software solution for enrypting data stored on devices like HDD's or USB-st Volumes are crossplatform and have to be mounted. Therefor you need a password.
    17 KB (2,810 words) - 16:55, 10 June 2008
  • * A Wireless Toolkit: Either from [http://developer.sonyericsson.com/site/globa ...Java code that establishes a direct Bluetooth connection you'll also need a Bluetooth stack that is supported by Avetana and the corresponding native l
    10 KB (1,547 words) - 16:53, 19 November 2010
View (previous 250 | ) (20 | 50 | 100 | 250 | 500)