The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Background Minimally invasive direct coronary artery bypass grafting (MIDCAB) was developed to decrease perioperative morbidity, some of which may be related to the use of cardiopulmonary bypass and to cross-clamping of the aorta. We report our initial experience with multivessel MIDCAB via distal mini-sternotomy (DIMS). DIMS is performed to gain access to the left and right internal thoracic arteries...
Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secrets or keys authenticated with the aid of out-of-band channels. While manually installing secret keys affects the practicability of the key deployment, out-of-band channels require additional...
Recently, several research contributions have justified that wireless communication is not only a security burden. Its unpredictable and erratic nature can also be turned against an adversary and used to augment conventional security protocols, especially key agreement. In this paper, we are inspired by promising studies on such key agreement schemes, yet aim for releasing some of their limiting assumptions...
During the last two decades, starting with the seminal work by Cruz, network calculus has evolved as a new theory for the performance analysis of networked systems. In contrast to classical queueing theory, it deals with performance bounds instead of average values and thus has been the theoretical basis of quality of service proposals such as the IETF's Integrated and differentiated services architectures...
Traditional methods for message authentication are based on the cryptographic verification of received data using some sort of a shared secret. While this task is not critical for traditional networks, Wireless Sensor Networks (WSNs) may pay a high price for the gained protection - sensor nodes are forced to invest their already scarce resources in receiving a message and executing cryptographic computations,...
Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired systems, although their deployment requires careful planning and expensive infrastructure that may be difficult to install or modify. Hence, solutions based on wireless sensor networks (WSNs) are gaining popularity to reduce cost...
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidentiality. However, the standard focuses on securing higher-layer data, i.e., protecting IEEE 802.11 data frames. Management frames used for connection administration are left unprotected and a wide spectrum of known attacks is...
The aim of the study was to evaluate the patensies of the distal anastomoses of coronary artery bypass grafts and to detect graft stenoses and occlusions with a magnetic resonance (MR) spin echo sequence.One hundred and eighty-five patients with 481 distal anastomoses were examined with a 1.5 T MR scanner and coronary angiography. A 2-dimensional T2-weigthed breath-hold half-Fourier acquisition single-shot...
Numerous studies have demonstrated that the levels of cyclooxygenase (COX), the enzyme that catalyzes the conversion of arachidonic acid to prostaglandin H 2 , and of prostaglandins are higher in various tumors and cells during inflammation than in normal tissues. The aim of the present study was to analyze whether COX-2 isoform expression was noticeably higher in fine-needle aspirates (FNA)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.