Protocol Element

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 441 Experts worldwide ranked by ideXlab platform

Jerrold H. Levy - One of the best experts on this subject based on the ideXlab platform.

  • Guidelines for Perioperative Care in Cardiac Surgery: Enhanced Recovery After Surgery Society Recommendations.
    JAMA surgery, 2019
    Co-Authors: Daniel T. Engelman, Walid Ben Ali, Judson B. Williams, Louis P. Perrault, V. Seenu Reddy, Rakesh C. Arora, Eric E. Roselli, Ali Khoynezhad, Marc W. Gerdisch, Jerrold H. Levy
    Abstract:

    Enhanced Recovery After Surgery (ERAS) evidence-based Protocols for perioperative care can lead to improvements in clinical outcomes and cost savings. This article aims to present consensus recommendations for the optimal perioperative management of patients undergoing cardiac surgery. A review of meta-analyses, randomized clinical trials, large nonrandomized studies, and reviews was conducted for each Protocol Element. The quality of the evidence was graded and used to form consensus recommendations for each topic. Development of these recommendations was endorsed by the Enhanced Recovery After Surgery Society.

Ulrich Herberg - One of the best experts on this subject based on the ideXlab platform.

  • Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2)
    2010
    Co-Authors: Thomas Heide Clausen, Ulrich Herberg
    Abstract:

    Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This memorandum takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.

  • Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)
    2010
    Co-Authors: Thomas Heide Clausen, Ulrich Herberg
    Abstract:

    Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.

Michel Suignard - One of the best experts on this subject based on the ideXlab platform.

  • Internationalized Resource Identifiers (IRIs) draft-duerst-iri-bis-06
    2010
    Co-Authors: M. Duerst, Michel Suignard, L. Masinter
    Abstract:

    This document defines a new Protocol Element, the Internationalized Resource Identifier (IRI), as an extension of the Uniform Resource Identifier (URI). An IRI is a sequence of characters from the Universal Character Set (Unicode/ISO 10646). A mapping from IRIs to URIs is defined, which provides a means for IRIs to be used instead of URIs, where appropriate, to identify resources.

  • Internationalized Resource Identifiers (IRIs)
    2005
    Co-Authors: Michel Suignard
    Abstract:

    This document defines a new Protocol Element, the Internationalized Resource Identifier (IRI), as a complement of the Uniform Resource Identifier (URI). An IRI is a sequence of characters from the Universal Character Set (Unicode/ISO 10646). A mapping from IRIs to URIs is defined, which means that IRIs can be used instead of URIs, where appropriate, to identify resources. The approach of defining a new Protocol Element was chosen instead of extending or changing the definition of URIs. This was done in order to allow a clear distinction and to avoid incompatibilities with existing software. Guidelines are provided for the use and deployment of IRIs in various Protocols, formats, and software components that currently deal with URIs.

  • Internationalized Resource Identifiers (IRIs) Status of This Memo
    2005
    Co-Authors: M. Duerst, Michel Suignard
    Abstract:

    This document defines a new Protocol Element, the Internationalized Resource Identifier (IRI), as a complement to the Uniform Resource Identifier (URI). An IRI is a sequence of characters from the Universal Character Set (Unicode/ISO 10646). A mapping from IRIs to URIs is defined, which means that IRIs can be used instead of URIs, where appropriate, to identify resources. The approach of defining a new Protocol Element was chosen instead of extending or changing the definition of URIs. This was done in order to allow a clear distinction and to avoid incompatibilities with existing software. Guidelines are provided for the use and deployment of IRIs in various Protocols, formats, and software components that currently deal with URIs.

Daniel T. Engelman - One of the best experts on this subject based on the ideXlab platform.

  • Guidelines for Perioperative Care in Cardiac Surgery: Enhanced Recovery After Surgery Society Recommendations.
    JAMA surgery, 2019
    Co-Authors: Daniel T. Engelman, Walid Ben Ali, Judson B. Williams, Louis P. Perrault, V. Seenu Reddy, Rakesh C. Arora, Eric E. Roselli, Ali Khoynezhad, Marc W. Gerdisch, Jerrold H. Levy
    Abstract:

    Enhanced Recovery After Surgery (ERAS) evidence-based Protocols for perioperative care can lead to improvements in clinical outcomes and cost savings. This article aims to present consensus recommendations for the optimal perioperative management of patients undergoing cardiac surgery. A review of meta-analyses, randomized clinical trials, large nonrandomized studies, and reviews was conducted for each Protocol Element. The quality of the evidence was graded and used to form consensus recommendations for each topic. Development of these recommendations was endorsed by the Enhanced Recovery After Surgery Society.

Thomas Heide Clausen - One of the best experts on this subject based on the ideXlab platform.

  • Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2)
    2010
    Co-Authors: Thomas Heide Clausen, Ulrich Herberg
    Abstract:

    Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This memorandum takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.

  • Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)
    2010
    Co-Authors: Thomas Heide Clausen, Ulrich Herberg
    Abstract:

    Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.