نتایج جستجو برای: label switching
تعداد نتایج: 132408 فیلتر نتایج به سال:
1. Overview ........................................................1 2. Specification of Requirements ...................................3 3. Signaling FCS Retention with MPLS-Based Pseudowires .............3 4. Signaling FCS Retention with L2TPv3-Based Pseudowires ...........4 5. Security Considerations .........................................5 6. Applicability Statement .......................
Because of polysemy, distant labeling for information extraction leads to noisy training data. We describe a procedure for reducing this noise by using label propagation on a graph in which the nodes are entity mentions, and mentions are coupled when they occur in coordinate list structures. We show that this labeling approach leads to good performance even when off-the-shelf classifiers are us...
In this paper, we present a learning method for sequence labeling tasks in which each example sequence has multiple label sequences. Our method learns multiple models, one model for each label sequence. Each model computes the joint probability of all label sequences given the example sequence. Although each model considers all label sequences, its primary focus is only one label sequence, and ...
Ethernet pseudowires are widely deployed to support packet transport of Ethernet services. These services in-turn provide transport for a variety of client networks, e.g., IP and MPLS. This document uses procedures defined in the existing IETF specifications of Ethernet pseudowires carried over MPLS networks. Many of the requirements for the services provided by the mechanisms explained in this...
Optimal labeling problems are NP-hard in many practically important cases. Sufficient conditions for optimal label detection in every pixel are formulated. Knowing the values of the optimal labeling in some pixels, as a result of applying the proposed algorithm, allows to decrease the complexity of the original problem essentially.
A guessing attack on a security protocol is an attack where an attacker guesses a poorly chosen secret (usually a low-entropy user password) and then seeks to verify that guess using other information. Past efforts to address guessing attacks in terms of design or analysis considered only protocols executed in isolation. However, security protocols are rarely executed in isolation and reality i...
The objective of this study is to develop a patch-based labeling method that cooperates with a label fusion using non-rigid registrations. We present a novel patch-based label fusion method, whose selected patches and their weights are calculated from a combination of similarity measures between patches using intensity-based distances and labeling-based distances, where a previous labeling of t...
Abrrrocr-lo this paper, B new algorithm for dynamic muting of LsPs is p r o m . While oB-he algorithms M not soilable due tu the naxrsary P priori lmowledgc of fohm LSP setup requests, our pmposed algorithm, SPeCRA (Stoehaslic Rrfamanc~ Comparison Routing Algorithm), does not any s p d c stoehsstie tramC model and does not q u i r e any lmowldge of fohme domanch. Bath featare B must for the new...
Currently, traffic engineering means circuit or virtual circuit switched technology even in packet switched networks. The need for a simpler and more suitable device for IP networks is getting stronger. In this paper, we present a new architecture for IP layer traffic engineering called Core State Limited Load Sharing (CSLLS). Our solution is highly tunable between low complexity – low granular...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید