نتایج جستجو برای: flexible protocol

تعداد نتایج: 360970  

2008
Kornel Laskowski Mattias Heldner Jens Edlund

This paper describes a recently introduced vector-valued representation of fundamental frequency variation – the FFV spectrum – which has a number of desirable properties. In particular, it is instantaneous, continuous, distributed, and well-suited to application of standard acoustic modeling techniques. We show what the representation looks like, and how it can be used to model prosodic sequen...

2001
Takayuki YAMAMOTO Masashi SUGANO Masayuki MURATA Takaaki HATAUCHI Yohei HOSOOKA

In ad hoc wireless networks, wireless terminals can autonomously construct and can maintain the network. They communicate with some neighbor terminals, exchange network information and determine routes for packets on the multi-hop wireless network. Flexible Radio Network (FRN), one of the ad hoc wireless network systems, adopts a proprietary protocol that provides a multiple routes management a...

2004
Nick Feamster Hari Balakrishnan Jennifer Rexford

The substantial complexity of interdomain routing in the Internet comes from the need to support flexible policies while scaling to a large number of Autonomous Systems. Despite impressive progress in characterizing the various ills of the Border Gateway Protocol (BGP), many problems remain unsolved, and the behavior of the routing system is still poorly understood. This paper argues that we mu...

2003
Hong Kee Sul Hyunchul Kim Kilnam Chon

Broadcasting protocols offer an efficient and scalable method to provide video-on-demand. We present a new broadcasting protocol that assumes that some portions of the video are already preloaded in the set-top-box (STB), and at the same time, requires the user to wait for a fixed-delay before viewing. As a result, there is a trade-off between the size of the consumed local storage, user waitin...

2002
Mesut Günes Udo Sorges Imed Bouazizi

A mobile ad-hoc network (MANET) is a collection of mobile nodes which communicate over radio. These kind of networks are very flexible, thus they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks are suitable for temporary communication links. The biggest challenge in this kind of networks is to find a path between the communication end poin...

2007
Ferruccio Barsi Alan A. Bertossi Francesco Betti Sorbelli Roberto Ciotti Stephan Olariu Maria Cristina Pinotti

A scalable energy-efficient training protocol is proposed for massively-deployed sensor networks, where sensors are initially anonymous and unaware of their location. The protocol is based on an intuitive coordinate system imposed onto the deployment area which partitions the anonymous sensors into clusters. The protocol is asynchronous, in the sense that the sensors wake up for the first time ...

2004
Ghassan Chehaibar

Flexible Architecture for Multiple Environments (FAME) is Bull architecture for large symmetrical multiprocessors based on Intel’s Itanium® 2 family, which is used in Bull NovaScale® servers series. A key point in the development of this distributed shared memory architecture is the definition of its cache coherence protocol. This paper reports experiences and results of integrating formal veri...

Journal: :IEEE Trans. Vehicular Technology 2000
Antonio Iera Salvatore Marano

In this correspondence, a dynamic reservation multiple access (D-RMA) protocol for third generation cellular mobile radio systems is proposed and its behavior is investigated under variable multimedia traffic conditions. D-RMA is a protocol which is explicitly designed to support multimedia traffic. Its structure is based on traditional PRMA++ protocol, but in addition to what PRMA++ provides, ...

2013
Ronan-Alexandre Cherrueau Rémi Douence Jean-Claude Royer Mario Südholt Anderson Santana de Oliveira Yves Roudier Matteo Dell'Amico

OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over HTTP. It was recently adopted by major internet players like Google, Facebook, and Microsoft. It has been pointed out that this framework is potentially subject to security issues, as well as difficulties concerning the interoperability between protocol participants and ...

Journal: :JCIT 2009
Mamoun Hussein Mamoun

The dynamic topology of Mobile ad hoc Network {MANET) allows nodes to join and leave the network at any point of time. This dynamic property of MANET has rendered it vulnerable to passive and active attacks by malicious nodes. In this paper we propose a new trust based relationship among the nodes to combat the packet dropping attack. In our scheme we considered the Dynamic Source Routing (DSR)...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید