نتایج جستجو برای: fixed protocol
تعداد نتایج: 441915 فیلتر نتایج به سال:
For increased and various communication requirements of modern applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mode. We present the Component-Based Communication Protocol Architecture (CCPA) to make communication dynamic and configurable. It can develop, test and store the customized componen...
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...
The growing availability of multiple network interfaces on both mobile and fixed hosts makes concurrent multipath transfer (CMT) an appealing option to improve the performance of increasingly bandwidth-hungry multimedia applications. The Westwood Stream Control Transmission Protocol with Partial Reliability (W-PR-SCTP) is a partially reliable, SCTP-based transport protocol featuring a novel ada...
This paper presents the design and implementation of CAN-RT-TOP (Real-Time Task-Oriented Protocol over CAN), which is a high level protocol over CAN. Although the CAN Bus uses fixed priorities, some standard protocols over CAN assign the priorities to specific nodes by encoding it in the destination node identifier, which produces reduced schedulability. The protocol presented in this paper pro...
This paper addresses the idea of using a server of negotiation protocols to facilitate negotiations in an open multi-agent system. The agents that do not know the negotiation protocols of the system can query the server for a description of the protocol and use it in negotiations. After pointing out some of the major problems encountered by the existing approaches, we propose a special type of ...
We propose a new simple trace logic that can be used to specify local security properties, i.e. security properties that refer to a single participant of the protocol specification. Our technique allows a protocol designer to provide a formal specification of the desired security properties, and integrate it naturally into the design process of cryptographic protocols. Furthermore, the logic ca...
In this paper, we analyze classical data compression with quantum side information (also known as the classical-quantum Slepian–Wolf protocol) in so-called large and moderate deviation regimes. non-asymptotic setting, protocol involves compressing sequences of finite length <tex-math notat...
of Research 1. Evaluation of BBM BBM of the flight hardware was evaluated by repeated culture experiment under the simulated conditions for space experiment. As a part of device development, materials of a fixed container (an EPDM bag) and the fixation ability of the fixatives were also evaluated. After long term storage (> one month) in the EPDM bag gave little damage on the fixed specimens wh...
objective: to compare the pregnancy outcomes achieved by in vitro fertilization (ivf) between minimal stimulation and conventional antagonist protocols in poor ovarian responders (pors). materials and methods: in this randomized controlled trial, 77 pors undergoing ivf were selected and divided into two groups. first group was the minimal stimulation group (n = 42) receiving 100 mg/day clomiphe...
today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when there is a connection between user a and b, user a shoul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید