نتایج جستجو برای: endpoint
تعداد نتایج: 21726 فیلتر نتایج به سال:
Nowadays there are several limitations in cancer treatment. One of these is the use of conventional medicines which not only target cancer cells and thus also cause high toxicity precluding effective treatment. Recent elucidation of mechanisms that cause cancer has led to discovery of novel key molecules and pathways which have have become successful targets for the treatments that eliminate on...
The objective of the network endpoint localization problem is to estimate the endpoints (source and destination) of some message passed through a communication network based upon the set of partially synchronized sensors that intercept the message. The topology of the network is unknown, however some prior information about node degrees in the network be available to the monitor. A preliminary ...
In plasma etching processes it is critical to know when the film being etched has cleared to the underlying film, i.e. to detect endpoint, in order to achieve the desired device performance in the resulting integrated circuit. The most highly utilized sensor technology for determining endpoint has historically been optical emission spectroscopy (OES), because it is both non-invasive and highly ...
In this paper, we discuss the possibility of applying weighted finite state transducer (WFST) as a unified framework to solve endpoint detection problem. In general, endpoint detection is composed of two cascaded decision processes. The first process is voice activity detection (VAD) which makes framelevel speech/non-speech classification. The second process is utterance-level detection which m...
We describe the implementation of two ATM congestion control mechanisms, credit-based ow control and ATM Forum-style ABR rate control, on the Credit Net experimental ATM LAN testbed. This document focuses speciically on the implementation choices and performance tradeoos available to the designer of a network interface card. We conclude that although credit protocols are more eecient and easier...
Online techniques are presented for estimating the source and destination of a suspect transmission through a network based on the activation pattern of sensors placed on network components. A hierarchical Bayesian model is used to relate routing, tracking, and topological parameters. A controlled Markovian routing model is used in conjunction with a recursive EM algorithm to derive adaptive ro...
We show that the segment endpoint visibility graph of any finite set of disjoint line segments in the plane admits a simple Hamiltonian polygon, if not all segments are collinear. This proves a conjecture of Mirzaian.
Recently, there has been much interest in admission control schemes that place the burden of admission control decisions on the end users. In these schemes, referred to as Endpoint Admission Control. the decision to join the network is taken by the user, based on the probing of the network using probe packets. Depending on the level of congestion, routers mark the probe packets and thus inform ...
We prove that convolution with arclength measure on the curve parametrized by h(t) := (t, t, . . . , t) is a bounded operator from L(R) to L(R) for the full conjectured range of exponents, improving on a result due to M. Christ. We also obtain nearly sharp Lorentz space bounds.
The standard NRQCD power counting breaks down and the OPE gives rise to color-octet shape functions at the upper endpoint of the photon energy spectrum in radiative Υ decay. Also in this kinematic regime, large Sudakov logarithms appear in the octet Wilson coefficients, ruining the perturbative expansion. Using SCET, the octet shape functions arise naturally and the Sudakov logarithms can be su...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید