نتایج جستجو برای: path file
تعداد نتایج: 195250 فیلتر نتایج به سال:
The paper presents original ways of using topic maps for information structuring and retrieval in medical elearning domain. The topic map is mainly used for graphical visualization of the MeSH thesaurus containing medical terms. The hierarchical structure of the descriptors from MeSH thesaurus that has also multiple associative and equivalence relationships between medical terms can be properly...
Peer-to-peer (P2P) is a distributed system without any centralized control or hierarchical organization nodes organize itself in a dynamic way. It allows different applications to achieve efficient and simple file sharing. Without any authentication adversary nodes can spoof the identity and spoil the integrity by falsifying the messages in the overlay. This enables malicious nodes to launch ma...
1 work partially supported by CSISEI-CNR Abstract Mobility in cellular networks requires to manage handovers, which occur as users move from one cell to another. Their effects, which are easily overcome for speech, may seriously affect data transmissions. In this paper we report about tests for evaluating the quality of transmission for data applications on a GSM cellular network. Static tests,...
INTRODUCTION The aim of this in vitro study was to evaluate the effects of establishing glide path on the centering ability and preparation time of two single-file reciprocating systems in mesial root canals of mandibular molars. METHODS AND MATERIALS Sixty extracted mandibular molars with curvatures of 25-39 degrees and separate foramina for the mesiobuccal and mesiolingual canals, were divi...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users’ private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence ...
The bandwidth available in a high-speed backbone network today is much greater than the capacity at the edge devices. As an example, when the transmission line rate is 10 Gbps, the end computing machine (end-system) may not be able to cope with the arriving data rate and is hence often a bottleneck for the data transfer. This performance bottleneck depends on the end-system workload. A key defi...
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully, it is essential that flash memory be controlled correctly through file system software. However, as is typical for embedded software, conventional testing methods often fail to detect hidden flaws in the software due t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید