منابع مشابه
The Logic Backbone of a Transcription Network
A great part of the effort in the study of coarse grained models of transcription networks concentrates on their dynamical features. In this letter, we consider their equilibrium properties, showing that the backbone underlying the dynamic descriptions is an optimization problem. It involves N variables, the gene expression levels, and M constraints, the effects of transcriptional regulation. I...
متن کاملnetwork of phonological rules in lori dialect of andimeshk: a study within the framework of post-generative approach.
پژوهش حاضر ارائه ی توصیفی است از نظام آوایی گویش لری شهر اندیمشک، واقع در شمال غربی استان خوزستان. چهارچوب نظری این پژوهش، انگاره ی پسازایشی جزءمستقل می باشد. این پایان نامه شامل موارد زیر است: -توصیف آواهای این گویش به صورت آواشناسی سنتی و در قالب مختصه های زایشی ممیز، همراه با آوانوشته ی تفصیلی؛ -توصیف نظام آوایی گویش لری و قواعد واجی آن در چهارچوب انگاره ی پسازایشی جزءمستقل و معرفی برهم کن...
Simulation of Mobile Backbone Network
The Mobile Backbone Network (MBN) architecture has been introduced to support multimedia applications for mobile adhoc wireless network. Under the MBN architecture, backbone nodes are dynamically elected to construct a mobile backbone network (Bnet). The MBN employs Mobile Backbone Network Routing with Flow Control (MBNR-FC) mechanism. It reduces the routing control overhead by selectively floo...
متن کاملDesigning a Predictable Internet Backbone Network
Designing a backbone network is hard. On one hand, users expect the network to have very high availability, little or no congestion, and hence little or no queueing delay. On the other hand, traffic conditions are always changing. Over time usage patterns evolve, customers come and go, new applications are deployed, and the traffic matrices of one year are quite different from the next. Yet the...
متن کاملReducing Unwanted Traffic in a Backbone Network
This paper studies the techniques a backbone ISP can employ to reduce unwanted traffic on its network. For this purpose, we extract likely sources of exploit (thus unwanted) traffic from packet traces collected on backbone links using an Internet traffic behavior profiling methodology we developed earlier. We first study the characteristics of exploit traffic from several aspects, such as netwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2005
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.95.158701