The Experts below are selected from a list of 441 Experts worldwide ranked by ideXlab platform
Jerrold H. Levy - One of the best experts on this subject based on the ideXlab platform.
-
Guidelines for Perioperative Care in Cardiac Surgery: Enhanced Recovery After Surgery Society Recommendations.
JAMA surgery, 2019Co-Authors: Daniel T. Engelman, Walid Ben Ali, Judson B. Williams, Louis P. Perrault, V. Seenu Reddy, Rakesh C. Arora, Eric E. Roselli, Ali Khoynezhad, Marc W. Gerdisch, Jerrold H. LevyAbstract:Enhanced Recovery After Surgery (ERAS) evidence-based Protocols for perioperative care can lead to improvements in clinical outcomes and cost savings. This article aims to present consensus recommendations for the optimal perioperative management of patients undergoing cardiac surgery. A review of meta-analyses, randomized clinical trials, large nonrandomized studies, and reviews was conducted for each Protocol Element. The quality of the evidence was graded and used to form consensus recommendations for each topic. Development of these recommendations was endorsed by the Enhanced Recovery After Surgery Society.
Ulrich Herberg - One of the best experts on this subject based on the ideXlab platform.
-
Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2)
2010Co-Authors: Thomas Heide Clausen, Ulrich HerbergAbstract:Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This memorandum takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.
-
Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)
2010Co-Authors: Thomas Heide Clausen, Ulrich HerbergAbstract:Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.
Michel Suignard - One of the best experts on this subject based on the ideXlab platform.
-
Internationalized Resource Identifiers (IRIs) draft-duerst-iri-bis-06
2010Co-Authors: M. Duerst, Michel Suignard, L. MasinterAbstract:This document defines a new Protocol Element, the Internationalized Resource Identifier (IRI), as an extension of the Uniform Resource Identifier (URI). An IRI is a sequence of characters from the Universal Character Set (Unicode/ISO 10646). A mapping from IRIs to URIs is defined, which provides a means for IRIs to be used instead of URIs, where appropriate, to identify resources.
-
Internationalized Resource Identifiers (IRIs)
2005Co-Authors: Michel SuignardAbstract:This document defines a new Protocol Element, the Internationalized Resource Identifier (IRI), as a complement of the Uniform Resource Identifier (URI). An IRI is a sequence of characters from the Universal Character Set (Unicode/ISO 10646). A mapping from IRIs to URIs is defined, which means that IRIs can be used instead of URIs, where appropriate, to identify resources. The approach of defining a new Protocol Element was chosen instead of extending or changing the definition of URIs. This was done in order to allow a clear distinction and to avoid incompatibilities with existing software. Guidelines are provided for the use and deployment of IRIs in various Protocols, formats, and software components that currently deal with URIs.
-
Internationalized Resource Identifiers (IRIs) Status of This Memo
2005Co-Authors: M. Duerst, Michel SuignardAbstract:This document defines a new Protocol Element, the Internationalized Resource Identifier (IRI), as a complement to the Uniform Resource Identifier (URI). An IRI is a sequence of characters from the Universal Character Set (Unicode/ISO 10646). A mapping from IRIs to URIs is defined, which means that IRIs can be used instead of URIs, where appropriate, to identify resources. The approach of defining a new Protocol Element was chosen instead of extending or changing the definition of URIs. This was done in order to allow a clear distinction and to avoid incompatibilities with existing software. Guidelines are provided for the use and deployment of IRIs in various Protocols, formats, and software components that currently deal with URIs.
Daniel T. Engelman - One of the best experts on this subject based on the ideXlab platform.
-
Guidelines for Perioperative Care in Cardiac Surgery: Enhanced Recovery After Surgery Society Recommendations.
JAMA surgery, 2019Co-Authors: Daniel T. Engelman, Walid Ben Ali, Judson B. Williams, Louis P. Perrault, V. Seenu Reddy, Rakesh C. Arora, Eric E. Roselli, Ali Khoynezhad, Marc W. Gerdisch, Jerrold H. LevyAbstract:Enhanced Recovery After Surgery (ERAS) evidence-based Protocols for perioperative care can lead to improvements in clinical outcomes and cost savings. This article aims to present consensus recommendations for the optimal perioperative management of patients undergoing cardiac surgery. A review of meta-analyses, randomized clinical trials, large nonrandomized studies, and reviews was conducted for each Protocol Element. The quality of the evidence was graded and used to form consensus recommendations for each topic. Development of these recommendations was endorsed by the Enhanced Recovery After Surgery Society.
Thomas Heide Clausen - One of the best experts on this subject based on the ideXlab platform.
-
Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2)
2010Co-Authors: Thomas Heide Clausen, Ulrich HerbergAbstract:Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This memorandum takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.
-
Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)
2010Co-Authors: Thomas Heide Clausen, Ulrich HerbergAbstract:Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing Protocol, managing the connectivity. By understanding how the algorithms of the routing Protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each Protocol Element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.