نتایج جستجو برای: buffer

تعداد نتایج: 42910  

2003
ZHU YIJUN LI QUANLIN L. QUANLIN

This paper refers to some closed two-stage queueing systems with state-dcpendent vacation policy. By means of the markovian rcnewal process and the stochastic decomposition formulas of the quantities in equilibrium for M/Gjl vacation models, we derive both stationary distributions of the queue length and the cyclic time for the closed state-dependcnt vacation model. We try to so!\'e the problem...

2003
Elizabeth Varki Arif Merchant Jianzhang Xu Xiaozhou Qiu

All enterprise storage systems depend on disk arrays to satisfy their capacity, reliability, and availability requirements. Performance models of disk arrays are useful in understanding the behavior of these storage systems and predicting their performance. We extend prior disk array modeling work by developing an analytical disk array model that incorporates the effects of workload sequentiali...

Journal: :Computer Communications 1994
Ananthanarayanan Chockalingam Pallapa Venkataram A. Prabhakar

In this paper, we present the throughput and delay performance of a busy tone based media access protocol in wireless networks with buffers at each node for queueing up messages. Partially connected static topologies with finite number of nodes that are globally synchronised to the slot duration are considered. Each node has unlimited buffer resources for transit messages and limited buffer cap...

2009
Sachin Kumar Rajput

i ii ACKNOWLEDGEMENT I wish to express my sincere appreciation to my thesis advisor, Mr. B. K. Hemant for his timely, informative feedback and support during this effort. It has been a great pleasure to learn from him during the process of expanding and refining my research. He has been a generous mentor. I also like to express my gratefulness to Dr. his perpetual encouragement, generous help a...

2009
Scott Smallwood

Sound Lanterns is an interactive sound installation that is powered by the sun, and emits sounds based on the amount of sunlight available, as well as on the amount of light that falls on light sensors on each of the four lanterns themselves. Listeners can change the nature of the sound by casting shadows over the solar panel, or over individual sound lanterns. The piece relies entirely on sunl...

2004
R. C. Hansen

Abstruct-The effects of measurement distance in distorting low sidelobe difference patterns are examined; this is a sequel to a paper on low sidelobe sum pattern effects. Previous calculations have used obsolete suboptimum aperture distributions. The Bayliss linear distribution is a versatile highly efficient and robust optimum distribution; its use here allows a single curve of sidelobe measur...

Journal: :محیط زیست طبیعی 0
مریم سعید صبائی دانش آموخته کارشناسی ارشد محیط زیست، دانشکده منابع طبیعی، ایران افشین دانه کار استادیار دانشکده منابع طبیعی دانشگاه تهران، ایران علی اصغر درویش صفت استاد دانشکده منابع طبیعی دانشگاه تهران، ایران عبدالعظیم قانقرمه عضو هیأت علمی مرکز تحقیقات منابع طبیعی دریای خزر، ایران حسن آزرم دل دانش آموخته کارشناسی ارشد دانشکده مرتع و آبخیزداری دانشگاه علوم کشاورزی و منابع طبیعی گرگان، ایران

many studies since 1977, in the southern coast of caspian sea revealed that the law-setback and low-lying coastal zone have been severely and increasingly impacted by rising sea-level. this rising continued until 1995. the rate of rising was nearly 13cm per year in this period (1977-1995). the general concept of setback determination is tended to introduce a buffer area between human activities...

2004
Fabricio Sergio de Paula Paulo Lício de Geus

This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion recovery and attack signature extraction. These features are enabled through attack evidence detection. This IDS is initially designed to deal with application attacks, extracting signature for remote buffer overflow attacks. ADeno...

Journal: :IJSSE 2010
Hossain Shahriar Mohammad Zulkernine

Buffer overflow (BOF) is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data buffers and introduce wide ranges of attacks like execution of arbitrary injected code. Many approaches are applied to mitigate buffer overflow vulnerabilities; however, mitigating BOF vulnerabilities is a perennial task as these vulnerabilities elude the mitigation ef...

2011
Arnold L. Gordon Zachary D. Tessler Cesar Villanoy

[1] The Sulu Sea, isolated from the neighboring ocean below 570 m, is nearly isothermal below 1250 m but with a marked salinity increase with depth. The source of the deep Sulu Sea water has been attributed to South China Sea water overflowing the 570 m topographic sill of Panay Strait. However, the Panay overflow (estimated as 0.32 × 10 m/sec) is an unlikely source for the saltier water Sulu S...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید