نتایج جستجو برای: wireline logs

تعداد نتایج: 10746  

2003
Fei Peng Victor C. M. Leung

TCP exhibits inherent unfairness towards connections with long round-trip times and connections that have to traverse multiple congested routers. We have previously proposed a TCP Bandwidth Allocation (TBA) algorithm to solve this problem and proved its effectiveness in wireline networks. In this paper, we apply the TBA algorithm to improve TCP fairness over heterogeneous wireless networks with...

2003
T. C. Wong J. W. Mark K. C. Chua Y. H. Chew

An approximate performance analysis of a leaky bucket with Pareto-distributed On/Off sources is presented. The aggregate of Pareto-distributed On/Off sources is a self-similar traffic. This analysis is applicable to the leaky bucket policing device at the ingresses of (1) a base station in a Wireless ATM network, (2) a wireline ATM network, and (3) future generations of IP-based networks with q...

Journal: :JTHTL 2003
J. Scott Marcus

Not so long ago, specific services and the associated networks were closely intertwined. Telecommunications networks delivered voice telephony. Broadcast systems delivered radio and television. The introduction of cable television and satellite transmission resulted in only a marginal increase in complexity. Today, one can no longer say that the service and the network are inextricably intertwi...

Journal: :IEEE Trans. on Circuits and Systems 2009
Lechang Liu Makoto Takamiya Tsuyoshi Sekitani Yoshiaki Noguchi Shintaro Nakano Koichiro Zaitsu Tadahiro Kuroda Takao Someya Takayasu Sakurai

A novel communication system which simultaneously achieves the mobility of wireless communication and the low-power performance of wireline communication is developed with a printable sheet. By combining meter-scale wireline communication and micrometer-scale wireless capacitive-coupling communication, the proposed communication system enables multiple electronic objects scattered over tables, ...

Journal: :جنگل و فرآورده های چوب 0
زهرا قربانی دانشجوی کارشناسی ‏ارشد مهندسی جنگل، دانشکدة منابع طبیعی، دانشگاه تهران، کرج، ایران مقداد جورغلامی دانشیار گروه جنگل داری و اقتصاد جنگل، دانشکدة منابع طبیعی، دانشگاه تهران، کرج، ایران

the log damage and value loss were examined by felling and bucking function, species, and damage type, in kheyrud forest in namkhaneh district in the hyrcanian forest of iran. in order to calculate the wood value following tree felling and bucking, 250 trees and 167 logs consisting of beech and hornbeam species were measured. there were five types of damage recorded following the tree felling o...

2004
Zhenmin Li Jed Taylor Elizabeth Partridge Yuanyuan Zhou William Yurcik Cristina Abad James J. Barlow Jeff Rosendale

Activity logs can be used for intrusion detection; however, most previous work on intrusion detection examines only activity logs from a single component. Doing so fails to take advantage of the naturally existing correlations among activities in different types of logs, such as network logs and system call logs. This paper explores correlation for intrusion detection. Specifically, we propose ...

Journal: :International Journal of Whole Person Care 2018

1999
Timo Kärki

The quality of grey alder logs (Alnus incana) was studied by sawing sample logs from two different forests in November 1995–February 1996. For grading of grey alder logs and sawn timber the proposed system of Keinänen and Tahvanainen (1995) plus the reject -grade was used. In general, grey alder logs have knots from the base to the top. All types of knots appear, and the length of the knot-free...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید