نتایج جستجو برای: ttl
تعداد نتایج: 685 فیلتر نتایج به سال:
We consider distributed and dynamic caching of coded content at small base stations (SBSs) in an area served by a macro station (MBS). Specifically, is encoded using maximum distance separable code cached according to time-to-live (TTL) cache eviction policy, which allows packets be removed from the caches periodic times. Mobile users requesting particular download SBSs within communication ran...
Covert channels are used as a means of secretly transferring information when there is a need to hide the fact that communication is taking place. With the vast amount of traffic on the internet, network protocols have become a common vehicle for covert channels, typically hiding information in the header fields of packets. Domain name service (DNS) packets contain a 32-bit time to live (TTL) f...
Web objects are stored and can be requested from numerous servers, including authoritative “origin” servers and caches. Objects can be modified only by their origin servers and weak consistency with cached copies is maintained by limiting their lifetime durations. Copies fetched from origin servers are received with maximum time-to-live (TTL) that equals their lifetime duration whereas copies o...
Modern mobile networks, such as GPRS and UMTS, support wireless data applications. One successful example is the ever popular i-Mode in Japan. Wireless data services (wireless Internet) become more important as more and more customers of handheld devices enjoy the convenience of the ubiquitous computing. To improve the effective wireless data access, the time-to-live (TTL) management for data e...
The MF8 consists of two second-order bandpass filter stages and an inverting operational amplifier. The two filter stages are identical and may be used as two tracking second-order bandpass filters, or cascaded to form a single fourth-order bandpass filter. The center frequency is controlled by an external clock for optimal accuracy, and may be set anywhere between 0.1 Hz and 20 kHz. The ratio ...
Recently, P2P-based discovery methods for semantic Web services require special attention from collaboration and interoperability in distributed computing environment. In this paper, we present an approach for semantic Web services discovery through a structured P2P network based on Chord. This protocol is chosen because it is scalable and still achieves very good resilience and proximity perfo...
When developing sophisticated multi-agent systems whose behaviors include collaboration, negotiation, and conflict resolution, analyzing and (empirically) verifying agent system behavior is a challenging task. To aid the developer in such tasks, this paper presents an approach that combines two software engineering tools – the Tracer Tool and the TTL Checker, which together record agent activit...
The DNS relies on caching to ensure high scalability and good performance. In optimizing caching, TTL adjustment provides a means of balancing between query load and TTLdependent performances such as data consistency, load balancing, migration time, etc. To gain the desired balance, TTL adjustment depends on predictions of query loads under alternative TTLs. This paper proposes a model of DNS s...
We propose a complete design for a scope limited, multihop broadcast middleware, which is adapted to the variability of the ad-hoc environment and works in unlimited ad-hoc networks such as a crowd in a city, or car passengers in a busy highway system. We address practical problems posed by: the impossibility to set the TTL correctly at all times, the poor performance of multiple access protoco...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید