نتایج جستجو برای: assurances
تعداد نتایج: 797 فیلتر نتایج به سال:
Encouraged by a 1990 Supreme Court decision, Medicaid providers have challenged State inpatient ratesetting methodologies under the Boren Amendment. Procedurally, State assurances to the U.S. Department of Health and Human Services (DHHS) that payment rates meet the Amendment's requirements must be supported by findings based on a reasonably principled analysis. Substantively, rates may fall wi...
In mobile ad hoc networks (MANETs), the provision of quality of service (QoS) guarantees is much more challenging than in wire line networks, mainly due to node mobility, multi hop communications, contention for channel access, and a lack of central coordination. The difficulties in the provision of such guarantees have limited the usefulness of MANETs. in the last decade, much research attenti...
The Session Initiation Protocol (SIP) protocol is commonly used to establish Voice over IP (VoIP) calls. IETF SIP standards do not specify a secure authentication process thus allowing malicious parties to impersonate other parties or to charge calls to other parties. This paper proposes an extension to the SIP protocol that uses an identity-based authentication mechanism and key agreement prot...
We present the first Utility Accrual (or UA) real-time scheduling algorithm for multiprocessors, called gMUA. The algorithm considers an application model where real-time activities are subject to time/utility function time constraints, variable execution time demands, and resource overloads where the total activity utilization demand exceeds the total capacity of all processors. We establish s...
The fifth-generation mobile network (5G) will enable interconnectivity between the home (HN) and data (DN) whereby users with their user equipment (UE) be able to access services provided by external service providers (SP) seamlessly. SP rely on security assurances authentication protocols used. For 5G, primary UE HN has been defined specified Third Generation Partnership Project (3GPP) while s...
Based on the experiences from an autonomous mobile robot project called MOBOT-III, we found hard realtime-constraints for the operating-system-design. ALBATROSS is “A flexible multi-tasking and realtime network-operating-system-kernel”. The focus in this article is on a communication-scheme fulfilling the previous demanded assurances. The central chapters discuss the shared buffer management an...
We introduce a new practical mechanism for remote data storage with access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable to establish any correlation between successive accesses, or e...
Software’s ability to adapt at run-time to changing user needs, system intrusions or faults, changing operational environment, and resource variability has been proposed as a means to cope with the complexity of today’s softwareintensive systems. Such self-adaptive systems can configure and reconfigure themselves, augment their functionality, continually optimize themselves, protect themselves,...
The Internet today offers primarily a best-effort service. Research and technology development efforts are currently underway to allow provisioning of better than besteffort Quality of Service (QoS) assurances. In this article, we develop a spot pricing framework for intradomain expected bandwidth contracts with loss based QoS guarantees. The framework builds on a nonlinear pricing scheme for c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید