نتایج جستجو برای: end to end

تعداد نتایج: 10658428  

2007
Animesh Pathak Luca Mottola Amol Bakshi Viktor K. Prasanna Gian Pietro Picco

Macroprogramming—the technique of specifying the behavior of the system, as opposed to the constituent nodes—provides application developers with high level abstractions that alleviate the programming burden in developing wireless sensor network (WSN) applications. However, as the semantic gap between macroprogramming abstractions and node-level code is considerably wider than in traditional pr...

Journal: :Studies in health technology and informatics 2011
Paul Koster Muhammad Asim Milan Petkovic

Personal telehealth is in rapid development with innovative emerging applications like disease management. With personal telehealth people participate in their own care supported by an open distributed system with health services. This poses new end-to-end security and privacy challenges. In this paper we introduce new end-to-end security requirements and present a design for consent management...

2015
Christoph Pinkel Andreas Schwarte Johannes Trame Andriy Nikolov Ana Sasa Tobias Zeuch

While individual components for semantic data integration are commonly available, end-to-end solutions are rare. We demonstrate DataOps, a seamless Anything-to-RDF semantic data integration toolkit. DataOps supports the integration of both semantic and non-semantic data from an extensible host of different formats. Setting up data sources end-to-end works in three steps: (1) accessing the data ...

Journal: :CoRR 2017
Trapit Bansal Arvind Neelakantan Andrew McCallum

We introduce RelNet: a new model for relational reasoning. RelNet is a memory augmented neural network which models entities as abstract memory slots and is equipped with an additional relational memory which models relations between all memory pairs. The model thus builds an abstract knowledge graph on the entities and relations present in a document which can then be used to answer questions ...

Journal: :IEEE Trans. Information Theory 1999
Ramón Cáceres Nick G. Duffield Joseph Horowitz Donald F. Towsley

Robust measurements of network dynamics are increasingly important to the design and operation of large internetworks like the Internet. However, administrative diversity makes it impractical to monitor every link on an end-to-end path. At the same time, it is difficult to determine the performance characteristics of individual links from end-to-end measurements of unicast traffic. In this pape...

2013
Irem Nizamoglu Sinem Coleri Ergen Öznur Özkasap

Vehicular ad-hoc networks (VANETs) aim to increase the safety of passengers by making information available beyond the driver’s knowledge. The challenging properties of VANETs such as their dynamic behavior and intermittently connected feature need to be considered when designing a reliable communication protocol in a VANET. In this study, we propose an epidemic and density adaptive protocol fo...

2012
Ronell Alberts Enrico Franconi

The application of ontologies in information systems is becoming increasingly prevalent. In particular, the use of ontologies as a conceptual view for the purpose of accessing information stored in underlying data repositories can increase the effectiveness of mechanisms for information querying and browsing. However, the process of ontology construction requires expertise in DLs, which is a sc...

Journal: :CoRR 2017
Peter Bailis Kunle Olukotun Christopher Ré Matei Zaharia

Despite incredible recent advances in machine learning, building machine learning applications remains prohibitively time-consuming and expensive for all but the best-trained, best-funded engineering organizations. This expense comes not from a need for new and improved statistical models but instead from a lack of systems and tools for supporting end-to-end machine learning application develop...

Journal: :Computer Communications 2008
Frederik Armknecht Dirk Westhoff Joao Girão Alban Hessler

The use of converge-cast traffic and in-network processing to minimize the amount of transmitted data is a frequently used approach to increase the lifetime of a wireless sensor network (WSN). Consequently when aiming at security for WSNs, one has to focus primarily on protecting this type of traffic. Some recent proposals support the encryption of convergecast traffic with in-network processin...

2013
Ikram Ud Din Saeed Mahfooz Huma Javed Muhammad Zeeshan

This study examines the effect of jitter and end-to-end delay happen in the transmission of real time applications. The study analyzes the performance during sending and receiving of voice and video packets. The proposed technique is applied on the buffer at the receiver side which divides the incoming packets into same size chunks. The end-to-end delay and jitter is high when the packet size i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید