نتایج جستجو برای: private label goods image
تعداد نتایج: 558666 فیلتر نتایج به سال:
Goods producers in Canada rely on transportation networks to move raw materials and intermediate goods among production sites and finished goods to domestic and international markets. Firms in the retail, tourism and other service sectors also depend on transportation networks to assemble supplies and goods for sale and to bring customers to their facilities. Events that disable parts of the tr...
The preference between public and private negotiations for a buyer who sequentially visits two suppliers is examined. It is shown that the buyer weakly prefers to conduct private negotiations in order to create strategic uncertainty about the trade history. With substitute goods, such uncertainty is valuable only when price offers have short expiries that prevent a head-to-head supplier competi...
A growth of the market share of private label brands has been observed in developed countries. This growth was initially confirmed for food and drugstore categories, but it quickly expanded to new product categories, particularly technology products. This study focus on a specific technology segment the private label brands in smartphones, due to the growth observed in its demand, in recent yea...
As Multiprotocol Label Switching (MPLS) is becoming a more widespread technology For providing virtual private network (VPN) services, MPLS architecture security is of increasing concern to service providers (SPs) and VPN customers. MPLS suffers from a number of security issues as soon as an attacker successfully penetrates the core. This paper provides an approach to enhance security in MPLS n...
This document defines protocol extensions and procedures for BGP Provider/Customer Edge router iteration in BGP/MPLS IP VPNs. These extensions and procedures have the objective of making the usage of the BGP/MPLS IP VPN transparent to the customer network, as far as routing information is concerned. Information about the current status of this document, any errata, and how to provide feedback o...
This document describes the MVPN (Multicast in BGP/MPLS IP VPNs) solution designed and deployed by Cisco Systems. The procedures specified in this document are largely a subset of the generalized MVPN framework recently standardized by the IETF. However, as the deployment of the procedures specified herein predates the publication of IETF standards (in some cases by over five years), an impleme...
let $g=(v, e)$ be a graph with $p$ vertices and $q$ edges. an emph{acyclic graphoidal cover} of $g$ is a collection $psi$ of paths in $g$ which are internally-disjoint and cover each edge of the graph exactly once. let $f: vrightarrow {1, 2, ldots, p}$ be a bijective labeling of the vertices of $g$. let $uparrow!g_f$ be the directed graph obtained by orienting the...
This document analyses the security of the BGP/MPLS IP virtual private network (VPN) architecture that is described in RFC 4364, for the benefit of service providers and VPN users. The analysis shows that BGP/MPLS IP VPN networks can be as secure as traditional layer-2 VPN services using Asynchronous Transfer Mode (ATM) or Frame Relay. Behringer Informational [Page 1] RFC 4381 Security of BGP/M...
This document defines Multi-Protocol BGP (MP-BGP) procedures that allow BGP speakers to exchange Route Target reachability information. This information can be used to build a route distribution graph in order to limit the propagation of Virtual Private Network (VPN) Network Layer Reachability Information (NLRI) between different autonomous systems or distinct clusters of the same autonomous sy...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید