نتایج جستجو برای: wireline logs
تعداد نتایج: 10746 فیلتر نتایج به سال:
TCP exhibits inherent unfairness towards connections with long round-trip times and connections that have to traverse multiple congested routers. We have previously proposed a TCP Bandwidth Allocation (TBA) algorithm to solve this problem and proved its effectiveness in wireline networks. In this paper, we apply the TBA algorithm to improve TCP fairness over heterogeneous wireless networks with...
An approximate performance analysis of a leaky bucket with Pareto-distributed On/Off sources is presented. The aggregate of Pareto-distributed On/Off sources is a self-similar traffic. This analysis is applicable to the leaky bucket policing device at the ingresses of (1) a base station in a Wireless ATM network, (2) a wireline ATM network, and (3) future generations of IP-based networks with q...
Not so long ago, specific services and the associated networks were closely intertwined. Telecommunications networks delivered voice telephony. Broadcast systems delivered radio and television. The introduction of cable television and satellite transmission resulted in only a marginal increase in complexity. Today, one can no longer say that the service and the network are inextricably intertwi...
A novel communication system which simultaneously achieves the mobility of wireless communication and the low-power performance of wireline communication is developed with a printable sheet. By combining meter-scale wireline communication and micrometer-scale wireless capacitive-coupling communication, the proposed communication system enables multiple electronic objects scattered over tables, ...
the log damage and value loss were examined by felling and bucking function, species, and damage type, in kheyrud forest in namkhaneh district in the hyrcanian forest of iran. in order to calculate the wood value following tree felling and bucking, 250 trees and 167 logs consisting of beech and hornbeam species were measured. there were five types of damage recorded following the tree felling o...
Activity logs can be used for intrusion detection; however, most previous work on intrusion detection examines only activity logs from a single component. Doing so fails to take advantage of the naturally existing correlations among activities in different types of logs, such as network logs and system call logs. This paper explores correlation for intrusion detection. Specifically, we propose ...
The quality of grey alder logs (Alnus incana) was studied by sawing sample logs from two different forests in November 1995–February 1996. For grading of grey alder logs and sawn timber the proposed system of Keinänen and Tahvanainen (1995) plus the reject -grade was used. In general, grey alder logs have knots from the base to the top. All types of knots appear, and the length of the knot-free...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید