نتایج جستجو برای: way switch
تعداد نتایج: 512016 فیلتر نتایج به سال:
We describe a novel method for scheduling highspeed network switches. The targeted architecture is an input-buffered switch with a non-blocking switch fabric. The input buffers are organized as virtual output queues to avoid head-of-line blocking. The task of the scheduler is to decide when the input ports can forward packets from the virtual output queues to the corresponding output ports. Our...
In [1] it was shown that there are very effective attacks leading to collisions for the hash function MD4 designed by R. Rivest [3]. A summary of the status of hash functions of the MD4-family with respect to collision-resistence can be found in [2] and [4]. However, attacking the one-wayness of a hash function is a much more demanding challenge, and in case of success it has much more devastat...
We describe a transport protocol suitable for BSPlib programs running on a cluster of PCs connected by a 100Mbps Ethernet switch. The protocol provides a reliable packet-delivery mechanism that uses global knowledge of a program's communication pattern to maximise the performance of the switch. The performance is comparable to previous low-latency protocols on similar hardware, but the addition...
The increasing complexity of integrated circuits drives the research of new on-chip interconnection architectures. A network on chip draws on concepts inherited from distributed systems and computer networks subject areas to interconnect IP cores in a structured and scalable way. The main goal pursued is to achieve superior bandwidth when compared to conventional on-chip bus architectures. This...
Many people with intellectual disabilities also have physical difficulties which prevent them from using standard computer control devices. Custom made alternative devices for those with special needs can be expensive and the low unit turnover makes the prospect unattractive to potential manufacturers. One solution is to explore the potential of devices used in contemporary gaming technology, s...
The headscarf conceals hair and other external features of a head (such as the ears). It therefore may have implications for the way in which such faces are perceived. Images of faces with hair (H) or alternatively, covered by a headscarf (HS) were used in three experiments. In Experiment 1 participants saw both H and HS faces in a yes/no recognition task in which the external features either r...
Efficient algorithms and techniques to detect and identify large flows in a high throughput traffic stream in the SDN matchand-action model are presented. This is in contrast to previous work that either deviated from the match and action model by requiring additional switch level capabilities or did not exploit the SDN data plane. Our construction has two parts; (a) how to sample in an SDN mat...
We present a new deeection method suitable for Manhattan-street networks (MSN), which, without dropping packets, limits the number of hops travelled by a packet on its way from source to destination. This allows the destination to bound the size of the reassembly buuer needed to reconstruct the original order of packets that may arrive out of sequence. The proposed routing scheme is intended fo...
This paper presents sensor-less speed control of induction motor (IM) using four switch three phase inverter (FSTPI) with direct torque and flux control (DTFC). The proposed sensor-less DTFC system consists of an adaptive observer of rotor flux to accurately estimate stator resistance and speed simultaneously, without affecting drive performances. The switching technique for DTFC of IM using FS...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید