نتایج جستجو برای: end to end joining
تعداد نتایج: 10660805 فیلتر نتایج به سال:
the study of air infiltration into the buildings is important from several perspectives that may be noted to energy and design of hvac systems, indoor air quality and thermal comfort and design of smoke control systems. given the importance of this issue, an experimental and numerical study of air infiltration through conventional doors and windows has been explored in iran. to this end, at fir...
to teach english adequately, qualified teachers are needed. unfortunately, there are still teachers who are teaching english without an academic degree in tefl. it is necessary for teachers to have a major in english to have subject knowledge, but it is not sufficient. teachers need to have an understanding of the social, cultural, moral, ethical, and pedagogical issues of education and practic...
Using the application of bulk data transfer, we investigate end-to-end failover mechanisms and thresholds for transport protocols that support multihoming (e.g., SCTP). First, we evaluate temporary failovers, and measure the tradeoff between aggressive (i.e., lower) thresholds and spurious failovers. We surprisingly find that spurious failovers do not degrade performance, and often actually imp...
A high performance, frame-based, real-time ATM scheduler is proposed for the wireless multimedia environment. We Ž . introduce the Delayed Frame Queueing DFQ scheduling protocol which only defines the service priorities, deadlines and eligibility times of queued cells. The DFQ protocol does not define the particular fashion in which a mobile or base station gains access to the shared transmissi...
A Session Initiation Protocol (SIP) User Agent (UA) does not always trust all intermediaries in its request path to inspect its message bodies and/or headers contained in its message. The UA might want to protect the message bodies and/or headers from intermediaries, except those that provide services based on its content. This situation requires a mechanism called "end-to-middle security" to s...
We address the problem of open-vocabulary object retrieval and localization, which is to retrieve and localize objects from a very large-scale image database immediately by a textual query (e.g., a word or phrase). We first propose Query-Adaptive R-CNN, a simple yet strong framework for open-vocabulary object detection. Query-Adaptive RCNN is a simple extension of Faster R-CNN from closedvocabu...
We have analyzed the measurements of end-to-end VoIP packets by tracing UDP packets between 12 testboxes in the Netherlands. We show that voice probes experience low delay and loss in the network. Moreover, we find that the reordering of packets has virtually no impact on the voice quality in our experiments. To determine the quality of VoIP calls over time, we have monitored the end-to-end pac...
Understanding the service quality of Internet paths is of great importance for both the service provider and the user. Motivated by this and particularly the aim of extracting such information from a given dataset collected through end-to-end measurement, this paper presents a novel approach, called SCI (Service-quality Characterization of Internet-path). Specifically, SCI utilizes delay and lo...
We introduce an efficient protocol for end-to-end handoff management in heterogeneous wireless IP-based networks. The protocol is based on the stream control transmission protocol (SCTP), and employs a soft-handoff mechanism that uses end-to-end semantics for signaling handoffs and for transmitting control messages. The design goal of this protocol is twofold—first, to reduce the home registrat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید