نتایج جستجو برای: fixed protocol

تعداد نتایج: 441915  

2005
DAI Hong-jun

For increased and various communication requirements of modern applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mode. We present the Component-Based Communication Protocol Architecture (CCPA) to make communication dynamic and configurable. It can develop, test and store the customized componen...

Journal: :RFC 2006
JunHyuk Song Radha Poovendran Jicheol Lee Tetsu Iwata

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...

Journal: :Computer Communications 2007
Marco Fiore Claudio Casetti Giulio Galante

The growing availability of multiple network interfaces on both mobile and fixed hosts makes concurrent multipath transfer (CMT) an appealing option to improve the performance of increasingly bandwidth-hungry multimedia applications. The Westwood Stream Control Transmission Protocol with Partial Reliability (W-PR-SCTP) is a partially reliable, SCTP-based transport protocol featuring a novel ada...

2004
Juan López Campos J. Javier Gutiérrez Michael González Harbour

This paper presents the design and implementation of CAN-RT-TOP (Real-Time Task-Oriented Protocol over CAN), which is a high level protocol over CAN. Although the CAN Bus uses fixed priorities, some standard protocols over CAN assign the priorities to specific nodes by encoding it in the destination node identifier, which produces reduced schedulability. The protocol presented in this paper pro...

2003
Cosmin Carabelea Philippe Beaune

This paper addresses the idea of using a server of negotiation protocols to facilitate negotiations in an open multi-agent system. The agents that do not know the negotiation protocols of the system can query the server for a description of the protocol and use it in negotiations. After pointing out some of the major problems encountered by the existing approaches, we propose a special type of ...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Ricardo Corin Antonio Durante Sandro Etalle Pieter H. Hartel

We propose a new simple trace logic that can be used to specify local security properties, i.e. security properties that refer to a single participant of the protocol specification. Our technique allows a protocol designer to provide a formal specification of the desired security properties, and integrate it naturally into the design process of cryptographic protocols. Furthermore, the logic ca...

Journal: :IEEE Transactions on Information Theory 2021

In this paper, we analyze classical data compression with quantum side information (also known as the classical-quantum Slepian–Wolf protocol) in so-called large and moderate deviation regimes. non-asymptotic setting, protocol involves compressing sequences of finite length <tex-math notat...

2004
Yoshihiro Mogami

of Research 1. Evaluation of BBM BBM of the flight hardware was evaluated by repeated culture experiment under the simulated conditions for space experiment. As a part of device development, materials of a fixed container (an EPDM bag) and the fixation ability of the fixatives were also evaluated. After long term storage (> one month) in the EPDM bag gave little damage on the fixed specimens wh...

Journal: :journal of family and reproductive health 0
shamim pilehvari reproductive health research center, tehran university of medical sciences, tehran, iran ensieh shahrokh tehraninejad reproductive health research center, tehran university of medical sciences, tehran, iran batool hosseinrashidi reproductive health research center, tehran university of medical sciences, tehran, iran fatemeh keikhah reproductive health research center, tehran university of medical sciences, tehran, iran fedyeh haghollahi reproductive health research center, tehran university of medical sciences, tehran, iran elham aziminekoo reproductive health research center, tehran university of medical sciences, tehran, iran

objective: to compare the pregnancy outcomes achieved by in vitro fertilization (ivf) between minimal stimulation and conventional antagonist protocols in poor ovarian responders (pors). materials and methods: in this randomized controlled trial, 77 pors undergoing ivf were selected and divided into two groups. first group was the minimal stimulation group (n = 42) receiving 100 mg/day clomiphe...

Journal: :journal of advances in computer research 2014
azin azizifard mohamad qermezkon tahereh postizadeh hamid barati

today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when  there is a connection between user a and b, user a shoul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید