نتایج جستجو برای: search protocols
تعداد نتایج: 391475 فیلتر نتایج به سال:
The performance and reliability of the Internet depend, in large part, on the operation of the underlying routing protocols. Today’s IP routing protocols compute paths based on the network topology and configuration parameters, without regard to the current traffic load on the routers and links. The responsibility for adapting the paths to the prevailing traffic falls to the network operators a...
| The recent growth of the Internet and its increased het-erogeneity have increased the complexity of network protocol design and testing. In addition, the advent of multipoint (multicast-based) applications has introduced new challenges that are qualitatively diierent in nature than the traditional point-to-point protocols. Multipoint applications typically involve a group of participants simu...
User profiling in web search has the advantage of enabling personalized web search: the quality of the results offered by the search engine to the user is increased by taking the user’s interests into account when presenting those results. The negative side is that the interests and the query history of users may contain information considered as private; hence, technology should be provided fo...
We study the veriication of properties of communication protocols modeled by a nite set of nite-state machines that communicate by exchanging messages via unbounded FIFO queues. It is well-known that most interesting veriication problems, such as deadlock detection, are undecidable for this class of systems. However, in practice, these veriication problems may very well turn out to be decidable...
The most important experiences we discovered from several disasters are that cellular networks were vulnerable, and the loss of communication system may have a catastrophic consequence. Mobile ad-hoc (MANETs) play significant role in construction campus, resident, battlefield search/rescue region. MANET is an appropriate network for supporting where no permanent infrastructure. effective uses t...
background: despite developments in surgical treatment, radiation therapy, and chemotherapy protocols, tumor recurrence and metastasis are still major problems in breast cancer management. the aim of the present report was to review and compare the performance of pet/ct with some of the conventional imaging modalities in detection of breast cancer recurrence. methods: a literature search was pe...
objective: to evaluate the current scientific evidence for the applicability, safety and effectiveness of pathways of enhanced recovery after emergency surgery (eras). methods: we undertook a search using pubmed and cochrane databases for eras protocols in emergency cases. the search generated 65 titles; after eliminating the papers not meeting search criteria, we selected 4 cohort studies and ...
Cellular telephony systems, where locations of a mobile users may be unknown at some times, are becoming more common. Mobile users are roaming in a zone. A user reports its location only if it leaves the zone entirely. We consider cellular zones with n cells and m mobile users roaming among the cells. The location of the users is uncertain and is given by m probability distribution vectors. The...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید