نتایج جستجو برای: end point

تعداد نتایج: 883619  

Journal: :TRANSACTIONS OF THE JAPAN SOCIETY OF MECHANICAL ENGINEERS Series C 1998

1999
Constantinos Dovrolis Parameswaran Ramanathan

The Internet applications and users have very diverse service expectations making the existing forwarding model, which treats all packets the same, inadequate and limiting. Consequently , there is now a widespread consensus that the Internet architecture must be extended to allow certain users and applications to get a better service than others at a higher cost. One approach, called absolute s...

2002
João Magalhães Agostinho David

Future mobile communications will bring a terminal diversity that until today has never happened before. 3GPP services will have to be developed taking into account every possible client. This paper describes an end-to-end framework able of delivering multimedia content that is tailored for each type of terminal. The framework is composed by three applications: a content authoring/analyzer appl...

Journal: :EURASIP J. Wireless Comm. and Networking 2012
Lutful Karim Tarek El Salti Nidal Nasser Qusay H. Mahmoud

Routing and topology control for Wireless Sensor Networks (WSNs) is significantly important to achieve energy efficiency in resource-constrained WSNs, and high-speed packet delivery. In this article, we introduce a framework for WSN that combines three design approaches: (1) clustering, (2) routing, and (3) topology control. In this framework, we implement an energy-efficient zone-based topolog...

1999
Sylvia Ratnasamy Steven McCanne

While the IP unicast service has proven successful, extending end-to-end adaptation to multicast has been a difficult problem. Unlike the unicast case, multicast protocols must support large and heterogeneous receiver sets. While proposed approaches to scaling multicast transports attempt to localize problems and/or organize receivers into a hierarchy through a divide-and-conquer approach, this...

2001
C. Ladas R. M. Edwards

Dealing with the high bit error rates and narrow bandwidths that typify wireless communications was not within the design goals of the Internet protocols TCP and IP. The wireless application protocol (WAP) was introduced to make better use the wireless channel and was designed using a split-connection scheme where WAP is only used for the wireless interface. This paper shows and discusses the c...

2014
Kareem Darwish Ahmed Abdelali Hamdy Mubarak

This paper presents an end-to-end automatic processing system for Arabic. The system performs: correction of common spelling errors pertaining to different forms of alef, ta marbouta and ha, and alef maqsoura and ya; context sensitive word segmentation into underlying clitics, POS tagging, and gender and number tagging of nouns and adjectives. We introduce the use of stem templates as a feature...

Journal: :J. UCS 2008
Wojciech Stanczuk Józef Lubacz Eugeniusz Toczylowski

This paper presents a novel market model for balancing communication bandwidth trade. The distinguishing characteristic of the model is that it assumes that market players can place buy offers not only for isolated network resources (inter-node links), but also for end-to-end network paths of predefined capacity. It also enables effective balancing of sell and buy offers for network resources i...

Journal: :Int. J. Communication Systems 2010
Mohamed K. Watfa Samir Selman Hovig Denkilkian

As over 70 percent of the earth’s surface is covered by water, it is desirable to deploy underwater sensor networks to support oceanic research. Under Water Sensor Networks (UWSNs) use acoustic waves and are characterized by long and variable propagation delays, intermittent connectivity, limited bandwidth and low bit rates. Energy savings have always been the primary concern in wireless sensor...

2015
Kaushal J. Patel Nirav M. Raja

Data Aggregation is widely used technique in wireless sensor networks (WSNs). The Security become a major issue, data confidentiality and data integrity in data aggregation. data aggregation should be incorporated in order to save energy. In this paper, the secure data aggregation schemes are categorized into hop by hop aggregation and end to end aggregation, and then the secure data aggregatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید