نتایج جستجو برای: end space

تعداد نتایج: 875704  

Journal: :CoRR 2013
Sowmyan Jegatheesan Nour El-Kadri

Many Internet service providers (ISPs) throughout the world are now in the process of integrating IPv6 into their Internet access products for retail customers and corporate clients. One of the most important features of the IPv6 protocol is its huge address space. This will enable users to assign a life-long stable, unique and globally routable IP address to each personal device. All users wil...

2010
Tomoya Okazaki Eitaro Kohno Tomoyuki Ohta Yoshiaki Kakuda

In recent years, ad hoc networks have attracted a great deal of attention. Ad hoc networks consist of nodes with wireless communication devices without any base stations or fixed infrastructures. Most routing protocols of ad hoc networks form a single-path. Single-path routing protocols need to repair routes each time the route has broken. This route repair generates a lot of control packets, a...

1996
Mladen A. Vouk Munindar P. Singh

This paper discusses some quality issues that face the next generation of the network-based scientific problem-solving environments. The advent of high-performance computing engines and networks is opening a fantastic opportunity for bringing serious numerical and problem-solving applications closer to a broad base of potential users with widely differing needs. From the perspective of these us...

2008
Whay Sing Lee William J. Dally Stephen W. Keckler Nicholas P. Carter Andrew Chang

We present a user-level message interface that provides high performance and very low processor overhead. In this system, messages are launched from within the user's general register le, and received in a hardware queue mapped to a general register. A message handler is started within the latency of a jump instruction upon arrival of the rst message word, up to 18 faster than conventional inte...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد یزد - دانشکده شیمی 1392

چکیده روغن اسانسی اندام های هوایی دو گونه گیاهی ایران از خانواده نعنائیان (nepeta persica، nepeta asterotricha) به دو روش تقطیر با آب و head space به دست آمد و ترکیبات موجود در آن ها به وسیله کروماتوگرافی گازی همراه با طیف سنجی جرمی جداسازی و شناسایی گردید. در روغن اسانسی حاصل از اندام هوایی n. persica، 18 ترکیب از 22/92% کل اسانس شناسایی شد و محصولات عمده (5/16%) 4a?, 7?, 7a? nepetalactone، ...

Journal: :journal of the structural engineering and geotechnics 0
l shahryari science and research branch, islamic azad university, fars, iran

this paper consists of three sections. in the first section an efficient method is used for decomposition of the canonical matrices associated with repetitive structures. to this end, cylindrical coordinate system, as well as a special numbering scheme were employed. in the second section, divide and conquer method have been used for eigensolution of these structures, where the matrices are in ...

2017
Gregory Farquhar Tim Rocktaschel Maximilian Igl Shimon Whiteson

Combining deep model-free reinforcement learning with on-line planning is a promising approach to building on the successes of deep RL. On-line planning with look-ahead trees has proven successful in environments where transition models are known a priori. However, in complex environments where transition models need to be learned from data, the deficiencies of learned models have limited their...

2000
Henning Sanneck

\Best e ort" packet-switched networks, like the Internet, do not o er a reliable transmission of packets to applications with real-time constraints such as voice. Thus, the loss of packets impairs the application-level utility. For voice this utility impairment is twofold: on one hand, even short bursts of lost packets may decrease signi cantly the ability of the receiver to conceal the packet ...

2008
Ahmad Al Hanbali Roland de Haan Richard J. Boucherie Jan-Kees C. W. van Ommeren

Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-tolerant networking which exploits the mobility of the nodes by letting them operate as relays according to the store-carry-and-forward paradigm. In this work, we analyze the delay performance of a small mobile ad hoc netw...

2001
Mark Handley Vern Paxson Christian Kreibich

A fundamental problem for network intrusion detection systems is the ability of a skilled attacker to evade detection by exploiting ambiguities in the traffic stream as seen by the monitor. We discuss the viability of addressing this problem by introducing a new network forwarding element called a traffic normalizer. The normalizer sits directly in the path of traffic into a site and patches up...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید