نتایج جستجو برای: telecommunications context

تعداد نتایج: 456580  

2007
Vítor Jesus

1. Context Interconnection problems between privately owned network operators can be traced back to the 19th century when the telegraph first appeared. After successful deployment of the technology at a national scale, there was the need to provide interconnection across country borders facilitating interoperation between independent providers of the telegraph service, each with its own proprie...

1994
Dirk Lanneer Marco Cornero Gert Goossens Hugo De Man

This paper describes a new and eeective approach to register and interconnect optimisation, which is applicable in a dual context : to reduce chip area in high-level synthesis, and to reduce resource load (and thus execution time) in retargetable code generation. The key idea is to carefully optimise the way in which data is transferred between functional units. The impact on high-level synthes...

2005
Richard S. Barr M. Scott Kingsley Raymond A. Patterson

Grooming has emerged as an active area of research within the operations research and telecommunications fields and concerns the optimization of network transmissions that span multiple distinct transmission channels, protocols, or technologies. This study explores the meaning of grooming, the technical context in which it can be applied, and example situations. A new taxonomy captures key aspe...

2013
George Xylomenos Christos Tsilopoulos Yannis Thomas George C. Polyzos

• NMP: Networked Music Performance • Ultra-low delay variant of conferencing • End-to-end delays of 25 rather than 150 ms • NMP is not the same as conferencing • Participants prefer to do their own mixing • The MCU should only relay data streams • The MusiNet project • Ultra-low delay audio and video coding • Each participant indicates what it wants to receive • The MCU maintains a stream routi...

Journal: :Scientific American 2003
Mark Warschauer

policy leaders and social scientists have grown increasingly concerned about a societal split between those with and those without access to computers and the Internet. The U.S. National Telecommunications and Information Administration popularized a term for this situation in the mid-1990s: the “digital divide.” The phrase soon became used in an international context as well, to describe the s...

Main result of this paper is to derive the exact analytical expressions of information and covariance matrix for multivariate Pareto, Burr and related distributions. These distributions arise as tractable parametric models in reliability, actuarial science, economics, finance and telecommunications. We showed that all the calculations can be obtained from one main moment multidimensional integr...

Journal: :CoRR 2011
Walter Quattrociocchi Frédéric Amblard

One of the most interesting scientific challenges nowadays deals with the analysis and the understanding of complex networks’ dynamics and how their processes lead to emergence according to the interactions among their components. In this paper we approach the definition of new methodologies for the visualization and the exploration of the dynamics at play in real dynamic social networks. We pr...

2018
Jingwen Wang Wenhao Jiang Lin Ma Wei Liu Yong Xu

Dense video captioning is a newly emerging task that aims at both localizing and describing all events in a video. We identify and tackle two challenges on this task, namely, (1) how to utilize both past and future contexts for accurate event proposal predictions, and (2) how to construct informative input to the decoder for generating natural event descriptions. First, previous works predomina...

Journal: :IJSITA 2011
Ruben Xing Zhongxian Wang Richard L. Peterson

As one of the most influential and beneficial developments today, Information Technology (IT) is quickly transforming business infrastructures and reshaping the way how people are affected in context to how they work and live. In order to meet the fast and changing trends in the 21st century, Information Technology should be redefined in five major areas, i.e., Power of Computing, Internet-work...

2004
A. H. Dekker

We examine the robustness of critical infrastructure networks, specifically aspects which relate to the network topology. We describe some simulation studies which identify a number of characteristics that make a network robust in the face of terrorist attacks, taking link capacity into account. Our simulations utilise a network analysis package called CAVALIER, which we have developed. Our res...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید