نتایج جستجو برای: including slaves qolāms

تعداد نتایج: 973564  

Journal: :The Journal of Negro History 1926

Journal: :IJABIM 2014
Harsh V. Verma

The term ‘cool’ is widely used expression in popular culture. This word is prefixed liberally with anything including people, behavior, place and brands. Notwithstanding ambiguity about what it stands there is complete clarity that it certainly adds value. ‘Cool’ in this perspective is precious resource which can be used in brand building. The authors’ exploration into its genesis and meaning r...

2001
Ralf Schlatterbeck Wilfried Elmenreich

TTP/A is the fieldbus protocol of the Time Triggered Architecture (TTA). It provides periodic transmission of realtime data and allows for on-line configuration, diagnostics, and maintenance by use of an interface file system. It is well integrated with the TTP/C protocol and is designed to meet the requirements of a low-cost sensor/actuator bus. TTP/A is a master-slave protocol where the maste...

2007
Yassine Daadaa Ivan Stojmenovic Nejib Zaguia

Bluetooth standard allows the creation of piconets, with one node serving as its master and up to seven nodes serving as slaves. Additional slaves must be parked, with significant overhead involved for parking and unparking them. Although the standard allows for the creation of a collection of connected piconets, called scatternet, it does not give any particular protocol for it. Given a set of...

2004
Karl E. Persson D. Manivannan

A Bluetooth scatternet is a scalable network topology that is formed by inter-connecting piconets. Piconets are the basic networking unit for Bluetooth devices, but can only accommodate up to eight devices; one master and seven slaves. In order to form scatternets, piconets can be inter-connected using bridge nodes that interleave their participation in multiple piconets. In this paper we prese...

2002
Wensheng Zhang Hao Zhu Guohong Cao

Bluetooth is a promising technology aiming at supporting short-range wireless communication. To achieve the advantage of simplicity and low-power, the master/slave model is used. However, this model has some drawbacks since no direct link exists between any two slaves in a piconet. Consequently, slave-to-slave communications must go through the master, and the master has to use extra bandwidth ...

2004
Shravan K Rayanchu Gautam Barua

Identifying the sources of a Distributed Denial-ofService (DDoS) attack is among the hardest problems in the Internet security area. Use of reflectors in a DDoS attack makes the problem particularly difficult as the actual sources of attack (slaves) are camouflaged. In this paper we propose a modification to the traceback of Multiple Hash DERM [13], an effective deterrent against DDoS attacks. ...

Journal: :CoRR 2011
Richard Barnes Clarence Lehman David Mulla

This paper presents a parallel algorithm for calculating the eight-directional (D8) up-slope contributing area in digital elevation models (DEMs). In contrast with previous algorithms, which have potentially unbounded inter-node communications, the algorithm presented here realizes strict bounds on the number of inter-node communications. Those bounds in turn allow D8 attributes to be processed...

2009

Tooth mutilation existed in sub-Saharan Africa, and was found among slaves transported to the New World. A small number of mutilation cases have been identified in early New World "Negro" skeletons from the Caribbean and Florida. The skeletal evidence alone precludes determining if the individuals were Africanor American-born, but limited ethnohistorical data suggested the former. This hypothes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید