نتایج جستجو برای: end to end
تعداد نتایج: 10658428 فیلتر نتایج به سال:
Self-stabilizing protocols must begin operating correctly even when started from an arbitrary state. The end-to-end problem is to ensure reliable message delivery across an unreliable network under the weakest possible guarantee from the network { that the sender and receiver are never separated by a cut of permanently failed links. In this paper we present the rst self-stabilizing end-to-end p...
We introduce a novel Deep Network architecture that implements the full feature point handling pipeline, that is, detection, orientation estimation, and feature description. While previous works have successfully tackled each one of these problems individually, we show how to learn to do all three in a unified manner while preserving end-to-end differentiability. We then demonstrate that our De...
Over the past couple of decades, the Internet has rapidly evolved from a collaborative social experiment to an agglomerate of competing commercial providers. This shift has helped maintain growth and has turned the Internet into a vast economic force, but it has also introduced some serious problems. A particularly bad problem is the inability of end-users to obtain the desired levels of perfor...
This is a position paper on applying the principles of the end-to-end approach to network storage. While it may seem to be a contradiction to end-to-end arguments to consider putting storage in the network, we argue that not only is there no contradiction, but that adherence to end-to-end principles is the key to achieving true scalability of shared storage. We discuss end-to-end arguments with...
We present a novel deep architecture termed templateNet for depth based object instance recognition. Using an intermediate template layer we exploit prior knowledge of an object’s shape to sparsify the feature maps. This has three advantages: (i) the network is better regularised resulting in structured filters; (ii) the sparse feature maps results in intuitive features been learnt which can be...
Pervasive computing requires some level of trust to be established between entities. In this paper we argue for an entity recognition based approach to building this trust which differs from starting from more traditional authentication methods. We also argue for the concept of a “pluggable” recognition module which allows different recognition schemes to be used in different circumstances. Fin...
A Session Initiation Protocol (SIP) User Agent (UA) does not always trust all intermediaries in its request path to inspect its message bodies and/or headers contained in its message. The UA might want to protect the message bodies and/or headers from intermediaries, except those that provide services based on its content. This situation requires a mechanism called "end-to-middle security" to s...
This paper presents a framework for the creation of transport protocols for mobile hosts that use multiple link layers simultaneously for the same connection. This abstraction provides an end-to-end transport layer channel between two applications that do not have to be aware of host mobility. The channel is composed of multiple network layer sub-channels. A sub-channel is an end-to-end network...
The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Multiple description (MD) video coding can be used to reduce the detrimental effects caused by transmission over lossy packet networks. A number of approaches have been proposed for MD coding, where each provides a different tradeoff between compression efficiency and error res...
In Ambient Assisted Living research and development, a significant effort has been dedicated to issues like gathering continuous information at home, standardizing formats in order to create environments more easily, extracting further information from raw data using different techniques to reconstruct context. An aspect relatively less developed but also important is the design of personalized...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید