نتایج جستجو برای: loopback
تعداد نتایج: 168 فیلتر نتایج به سال:
Petri nets are a formal tool for describing processes in a many of important technical and social applications. Their advantage over other related type instruments is very effective modeling of parallelism. This makes it easy to avoid improper behavior process. This article deals with the use of Petri nets for modeling specific type of control of dynamic systems, which reduces improper behavior...
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The algorithm is distributed and requires only local information. The algorithm can localize attacks for a variety of network applications. This algorithm is particularly well suited to the requirements of All-Optical Netwo...
Abstrac t-The paper illustrates a method for simultaneous ADC and DAC linearity testing in a loopback scheme. The main features of the method are: (i) it is statistically nearly optimal, being based on a maximum likelihood estimator; (ii) it does not require prior knowledge neither of the ADC nonlinearity, nor of the DAC nonlinearity – both are simultaneously measured relying only on a constant...
Block devices in computer operating systems typically correspond to disks or disk partitions, and are used to store files in a filesystem. Disks are not the only real or virtual device which adhere to the block accessible stream of bytes block device model. Files, remote devices, or even RAM may be used as a virtual disks. This article examines several common combinations of block device layers...
Current UML based behavioral requirements focus on the specification of use cases. Business rules are seen as a very important part of the requirements but are either considered as a separate entity or, at best, attached to use cases. Some authors have recognized the need to include business rules within use cases but there are no concrete guidelines on how to do it. In this paper we propose a ...
Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on a loopback address (such as 127.0.0.1). T...
We present experimental results for the effect of an increased supervisory signal power in a high-loss loopback supervisory system in an optically amplified WDM transmission line. The paper focuses on the investigation of increasing the input power for the supervisory signal and the effect on the copropagating WDM data signals using different channel spacing. This investigation is useful for de...
Current OSes include many logical sharing techniques (shared library, symbolic link, etc.) on memory and storage. Unfortunately they cause security and management problems which come from the dynamic management of logical sharing; e.g., search path replacement attack, GOT (Global Offset Table) overwrite attack, Dependency Hell, etc. This paper proposes that self-contained binaries eliminate the...
This paper presents and analyses a low cost and high performance manufacturing communication system. It consists in the standard TOP profile implemented in single processor computer connected to a IEEE 802.3 LAN. High throughput is achieved by an efficient implementation architecture based on specific layer interfaces and data structures, specialized mechanisms of memory management, timer manag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید