نتایج جستجو برای: split protocol
تعداد نتایج: 297445 فیلتر نتایج به سال:
We used the Fsp technique to quantify the influence of changing stages of consciousness on the signal-to-noise ratio of the middle latency response (MLR). The MLR and polysomnographic activity were obtained from 10 subjects during a continuous 6-hour period. The Fsp statistic was applied to the MLR data in order to determine the number of scores above a specified criterion in each stage of cons...
the set of all non-increasing non-negative integer sequences $pi=(d_1, d_2,ldots,d_n)$ is denoted by $ns_n$. a sequence $piin ns_{n}$ is said to be graphic if it is the degree sequence of a simple graph $g$ on $n$ vertices, and such a graph $g$ is called a realization of $pi$. the set of all graphic sequences in $ns_{n}$ is denoted by $gs_{n}$. the complete product split graph on $l ...
This paper explores ways to provide strong consistency for Internet applications scaling to millions of clients. We make four contributions. First, we identify the ways in which specific characteristics of data-access workloads affect the scalability of cache consistency algorithms. Second, we define two primitive mechanisms, split and join for growing and shrinking hierarchies. We show how the...
This paper addresses some requirements of self-organizing networks as well as interoperability problems due to merges and splits phenomena. In a mobile environment, merges and splits characterize the spatial overlap between two self-organized networks. While merge refers to the time when two disjoint networks meet and overlap, split refers to the time of partition. In a dynamic environment, Aut...
This paper explores ways to provide strong consistency for Internet applications scaling to millions of clients. We make four contributions. First, we identify the ways in which specific characteristics of data-access workloads affect the scalability of cache consistency algorithms. Second, we define two primitive mechanisms, split and join for growing and shrinking hierarchies. We show how the...
In this paper, we introduce a cache protocol verification technique based on a symbolic state expansion procedure. A global FSM (Finite State Machine) model characterizing the protocol behavior is built and protocol verification becomes equivalent to finding whether or not the global FSM may enter erroneous states. In order to reduce the complexity of the state expansion process, all the caches...
We have designed a novel Event-Condition-Action (ECA) scheme based Ad hoc On-demand Distance Vector(ECA-AODV) routing protocol for a Ubiquitous Network (UbiNet). ECA-AODV is designed to make routing decision dynamically and quicker response to dynamic network conditions as and when event occur. ECA scheme essentially consists of three modules to make runtime routing decision quicker. First, eve...
Aim To assess the efficacy of a commercially available adjunctive phototherapy protocol (“Perio-1”) in treatment periodontitis. Materials and Methods In an examiner-blind, randomized, controlled, split-mouth, multicentre study, 60 periodontitis patients received root surface debridement (RSD) sextants either alone (control sextants) or with (test sextants). Re-evaluation was performed at 6, 12 ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید