نتایج جستجو برای: reliable data transfer

تعداد نتایج: 2744127  

1997
Umesh Maheshwari

We present a new protocol for reliable delivery of messages over a network that might lose, duplicate, reorder, or arbitrarily delay packets. It is the first protocol that guarantees exactly-once and ordered delivery on a connection while avoiding precursory handshakes. Avoiding handshakes reduces the overhead for sending small, intermittent messages as in remote procedure calls and protocols l...

2007
V. Sathe M. C. Papaefthymiou S. V. Kosonocky S. Kim

Data transfer between arbitrary asynchronous clock domains is complicated, and practical solutions can be subject to synchronisation failure. But many practical systems use quotient frequencies and the direct conversion method (DCM) exploits this to achieve reliable data transfer without any handshaking. DCM minimises throughput, even between distant cores, is provably correct and has been asse...

1996
John Callahan Todd Montgomery Brian Whetten

Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (aMP) is implemented on top ofIP multicast [14] to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next de...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1392

a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2016

Journal: :Neural Computing and Applications 2022

Abstract Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted fragments. Typically, current approaches employ statistics derived from byte-level distribution, entropy estimation, However, modern content types use compression techniques which alter distribution pushing it closer the uniform distribution. The resu...

Journal: :International Journal of Computer Applications 2013

Journal: :Journal of Japan Society of Hydrology and Water Resources 1992

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید