نتایج جستجو برای: outlet bucket

تعداد نتایج: 17705  

2006
Lucjan Janowski Tadeusz Czachórski Andrzej Jajszczyk Jacek Kmiecik

Numerous investigations have revealed that the packet network traffic is bursty and highly correlated. If many large bursts meet in a single queue an overflow is unavoidable even for a slightly loaded network, therefore shaping packet traffic becomes a crucial issue. One of the most commonly used traffic shaping algorithms is a leaky bucket. An important property of a leaky bucket algorithm is ...

2010
Chi Li Xiaobing Lu Shuyun Wang

The capacity degradation of bucket foundation in liquefied sand layer under cyclic loads such as equivalent dynamic ice-induced loads is studied. A simplified numerical model of liquefied sand layer has been presented based on the dynamic centrifuge experiment results. The ice-induced dynamic loads are modeled as equivalent sine cyclic loads, the liquefaction degree in different position of san...

2011
Ya-hong Xie Chun-dong Hu Li-zhen Liang Sheng Liu Yuan-lai Xie Cai-chao Jiang Jun LI Zhi-min Liu

The bucket ion source is widely used as the high energy beam source on the high power neutral beam injector system. A hot cathode bucket ion source is studied. The main parameters which influence the performance of bucket ion source are arc voltage, filament voltage, gas inlet rate and extracted voltage. The proton ratio is the dominate parameter for the ion source. In the experiment, the chara...

2007
Gunnar Johansson

The hash table is a common data structure for applications requiring constant time insert, delete and find of certain items. The basic idea is to use an array of buckets, where each bucket stores a list of items. A hash function is used to determine which bucket a certain item belongs to. Finding or deleting a specific item amounts to a linear search in a bucket list pointed to by the hash func...

2004
Natwar Modani Parijat Dube Anurag Kumar

Most on-line (i.e., not stored) Variable Bit Rate sources would find it difficult to a priori declare the traffic parameters required by a connection admission control strategy. There is thus the problem of measurement based on-line estimation of source parameters. In this paper we address the problem of selection of source parameters based on minimising a bufferbandwidth cost function in the n...

2001
Gregorio Procissi Mario Gerla Jinkyu Kim Scott Seongwook Lee M. Y. Sanadidi

The Long Range Dependence (LRD) property of actual traffic in today’s network applications has been shown to have significant impact on network performance. In this paper we consider the problem of optimally dimensioning token bucket parameters for LRD traffic. We first empirically illustrate the different behavior of token buckets when acting on LRD vs. SRD traffic with identical average and p...

Journal: :Communicable diseases intelligence quarterly report 2004
Jennifer Barralet Russell Stafford Chris Towner Peta Smith

Telephone interviews were initially conducted for fi ve cases using a hypothesis-generating questionnaire. These interviews revealed that all fi ve cases worked in the Brisbane Central Business District (CBD) and had eaten takeaway sushi as a lunch meal in the fi ve days prior to their illness. Four cases reported eating takeaway sushi rolls from the same sushi takeaway outlet (outlet A) and on...

2000
Natwar Modani Parijat Dube Anurag Kumar

Most on-line (i.e., not stored) Variable Bit Rate sources would find it difficult to a priori declare the traffic parameters required by a connection admission control strategy. There is thus the problem of measurement based on-line estimation of source parameters. In this paper we address the problem of selection of source parameters based on minimising a bufferbandwidth cost function in the n...

Journal: :Computer Communications 2002
Gregorio Procissi Anurag Garg Mario Gerla M. Y. Sanadidi

The token bucket characterization provides a deterministic yet concise representation of a traf®c source. In this paper, we study the impact of the long-range dependence (LRD) property of traf®c generated by today's multimedia applications on the optimal dimensioning of token bucket parameters. To this aim, we empirically illustrate the difference between the token bucket characteristics of tra...

2015
Srinivasan Arunachalam Vlad Gheorghiu Tomas Jochym-O'Connor Michele Mosca Priyaa Varshinee Srinivasan

We study the robustness of the bucket brigade quantum random access memory model introduced by Giovannetti, Lloyd, and Maccone [Phys. Rev. Lett. 100, 160501 (2008)]. Due to a result of Regev and Schiff [ICALP’08 pp. 773], we show that for a class of error models the error rate per gate in the bucket brigade quantum memory has to be of order o(2−n/2) (where N = 2 is the size of the memory) whene...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید