The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Background
We have developed innovative base formulations that were designed to mimic the skin with respect to its components and galenic structure. Components include water, proteins, lipids, sugars and minerals.
Objectives
We characterized formulations and their skin penetration using in vitro methods and evaluated their impact on skin hydration in a clinical trial.
Methods
Scanning electron...
In today's field of distributed software architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and having various Quality of Service requirements (e.g., timeliness, availability or security). System customization using middleware-services is a promising solution to deal with the coexistence of multiple applications...
In this paper, we present two measures to counter attacks against OLSR: prevention that solves some protocol's vulnerabilities, and countermeasures that treat misbehavior and inconsistency concerned by the vulnerabilities that have not been solved with prevention measures. The resulting mechanisms allow to resolve the OLSR vulnerabilities which are due to the easy usurpation of node's identity, and...
Trust is one of the basic assumptions that we use in every day life. In ad hoc networks, routing protocols implement trust implicitly between the nodes of the network. Unfortunately, the implicit trust relations are not used by nodes whereas the attacks on ad hoc routing protocols precisely lead to the violation of at least one of these trust relations.In this paper, we demonstrate that a node can...
The goal of this paper is to explicit the different types of trust relations between entities which exchange routing information and establish a routing infra-structure based on the OLSR protocol. One such entity assumes the other entities will behave in a particular way and the relations coming from this trust behavior are expressed in this paper using a formal language. This approach highlights...
MANETs (Mobile Ad hoc NETworks) allow to deploy networks without any preexisting infrastructure. They are appealing approach for battlefield and emergency networks since they allow to easily interconnect the units that are engaged on the field. An unit is a predefined group of users working together to accomplish a specific task. With this idea we decided to extend the OLSR (Optimized Link State Routing)...
The paper introduces the Aster distributed composition-based programming system that is aimed at easing the development of distributed runtime systems, customized to the application needs, in a CORBA-based environment. Our approach is based on high-level customization: given the specification of application requirements using the Aster composition language, a distributed runtime system, customized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.