SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Ruggiero C) srt2:(2000-2004)"

Sökning: WFRF:(Ruggiero C) > (2000-2004)

  • Resultat 1-7 av 7
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Adcox, K, et al. (författare)
  • PHENIX detector overview
  • 2003
  • Ingår i: Nuclear Instruments & Methods in Physics Research. Section A: Accelerators, Spectrometers, Detectors, and Associated Equipment. - 0167-5087. ; 499:2-3, s. 469-479
  • Tidskriftsartikel (refereegranskat)abstract
    • The PHENIX detector is designed to perform a broad study of A-A, p-A, and p-p collisions to investigate nuclear matter under extreme conditions. A wide variety of probes, sensitive to all timescales, are used to study systematic variations with species and energy as well as to measure the spin structure of the nucleon. Designing for the needs of the heavy-ion and polarized-proton programs has produced a detector with unparalleled capabilities. PHENIX measures electron and muon pairs, photons, and hadrons with excellent energy and momentum resolution. The detector consists of a large number of subsystems that are discussed in other papers in this volume. The overall design parameters of the detector are presented. (C) 2002 Elsevier Science B.V. All rights reserved.
  •  
2.
  •  
3.
  • Jaeger, B, et al. (författare)
  • Body dissatisfaction and its interrelations with other risk factors for bulimia nervosa in 12 countries.
  • 2002
  • Ingår i: Psychotherapy and Psychosomatics. - 0033-3190 .- 1423-0348. ; 71:1, s. 54-61
  • Tidskriftsartikel (refereegranskat)abstract
    • BACKGROUND: It is widely accepted that risk factors for bulimia nervosa, mainly body dissatisfaction, are dependent on cultural factors. However, to date few studies have compared data from different cultures with an appropriate methodology. Therefore we aimed to gather reliable information on body dissatisfaction and other risk factors for bulimia from different nations and to reveal their functional interrelations.METHODS: A series of 10 silhouettes, designed to be as far as possible free from cultural and other detailed aspects, was shown to 1,751 medical and nursing students in 12 nations. A functional model was applied to each sample and tested by structural equation methodology.RESULTS: The most extreme body dissatisfaction was found in northern Mediterranean countries, followed by northern European countries. Countries currently undergoing a process of westernization show an intermediate amount of body dissatisfaction, and non-western countries demonstrate rather low values. Body dissatisfaction is the most important influence on dieting behaviour in most countries.CONCLUSIONS: Despite ongoing adoption of western values worldwide, we observe remarkable differences in body dissatisfaction between different cultures. That body dissatisfaction seems disturbingly partly detached from the actual BMI, i.e. possible overweight, as well as from feelings of low self-esteem in some western countries, raises new questions about the possible origin of the pressure to be thin.
  •  
4.
  •  
5.
  • Martucci, Leonardo, et al. (författare)
  • A Lightweight Distributed Group Authentication Mechanism
  • 2004
  • Konferensbidrag (refereegranskat)abstract
    • Identifying trustable devices and establishing secure tunnels between them in ad hoc network environments is a difficult task because it has to be quick, inexpensive and secure. Certificate-based authentication mechanisms are too expensive for small devices. The use of such mechanisms must be controlled and reserved for special situations, (e.g. banking applications) but not for everyday transactions. In addition, indiscriminate use of asymmetric ciphering and certificate-based authentication is a shortcut to battery exhaustion attacks. This paper describes a lightweight distributed group authentication mechanism suitable for ad hoc network devices requirements. We introduce the concept of group authentication, which target is not the individual identification of devices, but to verify if a device belongs or does not belong to a trusted group. The proposed mechanism verifies if devices have a pre-shared secret and sets new cipher keys each time it runs. This mechanism requires loose synchronization among the devices real time clocks to thwart replay attacks. It also mitigates the effects of battery exhaustion attacks due to its lightness
  •  
6.
  • Martucci, Leonardo, et al. (författare)
  • A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks
  • 2004
  • Konferensbidrag (refereegranskat)abstract
    • This paper describes a trust based security architecture for small/medium-sized mobile ad hoc networks. We designed and implemented a security architecture that extends the traditional PKI model, assigning variable trust values to digital certificates and issuing credentials to grant access to network services. Trust values are not static; they vary during regular network operation as network users provoke security incidents. Depending on the seriousness of the incidents the trust value associated to the offenders certificate will vary. Eventually, a series of security incidents may end up with the certificate revocation. We also developed a security framework for designing secure applications and built prototypes to test and validate our architecture. We considered service-oriented ad hoc networks, where every mobile device is classified as service providers or service users
  •  
7.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-7 av 7

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy