نتایج جستجو برای: including slaves qolāms
تعداد نتایج: 973564 فیلتر نتایج به سال:
The term ‘cool’ is widely used expression in popular culture. This word is prefixed liberally with anything including people, behavior, place and brands. Notwithstanding ambiguity about what it stands there is complete clarity that it certainly adds value. ‘Cool’ in this perspective is precious resource which can be used in brand building. The authors’ exploration into its genesis and meaning r...
TTP/A is the fieldbus protocol of the Time Triggered Architecture (TTA). It provides periodic transmission of realtime data and allows for on-line configuration, diagnostics, and maintenance by use of an interface file system. It is well integrated with the TTP/C protocol and is designed to meet the requirements of a low-cost sensor/actuator bus. TTP/A is a master-slave protocol where the maste...
Bluetooth standard allows the creation of piconets, with one node serving as its master and up to seven nodes serving as slaves. Additional slaves must be parked, with significant overhead involved for parking and unparking them. Although the standard allows for the creation of a collection of connected piconets, called scatternet, it does not give any particular protocol for it. Given a set of...
A Bluetooth scatternet is a scalable network topology that is formed by inter-connecting piconets. Piconets are the basic networking unit for Bluetooth devices, but can only accommodate up to eight devices; one master and seven slaves. In order to form scatternets, piconets can be inter-connected using bridge nodes that interleave their participation in multiple piconets. In this paper we prese...
Bluetooth is a promising technology aiming at supporting short-range wireless communication. To achieve the advantage of simplicity and low-power, the master/slave model is used. However, this model has some drawbacks since no direct link exists between any two slaves in a piconet. Consequently, slave-to-slave communications must go through the master, and the master has to use extra bandwidth ...
Identifying the sources of a Distributed Denial-ofService (DDoS) attack is among the hardest problems in the Internet security area. Use of reflectors in a DDoS attack makes the problem particularly difficult as the actual sources of attack (slaves) are camouflaged. In this paper we propose a modification to the traceback of Multiple Hash DERM [13], an effective deterrent against DDoS attacks. ...
This paper presents a parallel algorithm for calculating the eight-directional (D8) up-slope contributing area in digital elevation models (DEMs). In contrast with previous algorithms, which have potentially unbounded inter-node communications, the algorithm presented here realizes strict bounds on the number of inter-node communications. Those bounds in turn allow D8 attributes to be processed...
Tooth mutilation existed in sub-Saharan Africa, and was found among slaves transported to the New World. A small number of mutilation cases have been identified in early New World "Negro" skeletons from the Caribbean and Florida. The skeletal evidence alone precludes determining if the individuals were Africanor American-born, but limited ethnohistorical data suggested the former. This hypothes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید