نتایج جستجو برای: end to end

تعداد نتایج: 10658428  

Journal: :CoRR 2010
Gérard Chalhoub François Delobel Michel Misson

Wireless sensor networks are conceived to monitor a certain application or physical phenomena and are supposed to function for several years without any human intervention for maintenance. Thus, the main issue in sensor networks is often to extend the lifetime of the network by reducing energy consumption. On the other hand, some applications have high priority traffic that needs to be transfer...

2007
Myeong-jin Lee

In this paper, we consider a feedback-basedvideo transmission system over ATM ABR service under the constraints of xed end-to-end delay. The lower bound of future available rates is obtained by the states of leaky-bucketsfor high-priorityconnectionsand the occupancy of switch buuer. Based on this bound, an upper bound of feedback rates are derived, that guarantees the end-to-end delay constrain...

Journal: :Information 2017
Franco Mazzenga Romeo Giuliano Alessandro Vizzarri

Modern train control systems rely on a dedicated radio network for train to ground communications. A number of possible alternatives have been analysed to adopt the European Rail Traffic Management System/European Train Control System (ERTMS/ETCS) control system on local/regional lines to improve transport capacity. Among them, a communication system based on public networks (cellular&satellite...

2018
Shireesh Bhat George N. Rouskas

A key challenge in multi-vendor heterogeneous virtual optical networks is providing transparent access to network resources and virtual functions in a manner that enables users to combine them appropriately into meaningful end-to-end services. In this paper, we present a solution that consists of two components: an open marketplace where vendors and users of network resources and functions meet...

1992
Richard A. Golding

Many applications designed for wide-area systems use replication to provide a service at multiple locations. From which site should a client choose to obtain service? A client can specify its needs in terms of communication latency, bandwidth, or error rate. This specification must be matched against the expected performance available from each site. I present the results of two experiments tha...

Journal: :Industrial Management and Data Systems 2004
Ming-Hui Huang Jyun-Cheng Wang Shihti Yu Chui-Chen Chiu

E-businesses using enterprise resource planning systems as the information infrastructure generate a tremendous amount of information, including information about customers, suppliers, markets, transaction costs, the prices at which products are bought and sold, and order-fulfillment rates, etc. To turn the information contained in these systems into marketable information goods would be a key ...

2007
Mradula Neginhal Khaled Harfoush Harry G. Perros

In this paper, we propose a practical and efficient technique, Forecaster, to estimate (1) the end-to-end available bandwidth, and (2) the speed of the most congested (tight) link along an Internet path. Forecaster is practical since it does not assume any a priori knowledge about the measured path, does not make any simplifying assumptions about the nature of cross-traffic, does not assume the...

Journal: :CoRR 2016
Jiwei Li Alexander H. Miller Sumit Chopra Marc'Aurelio Ranzato Jason Weston

A good dialogue agent should have the ability to interact with users. In this work, we explore this direction by designing a simulator and a set of synthetic tasks in the movie domain that allow the learner to interact with a teacher by both asking and answering questions. We investigate how a learner can benefit from asking questions in both an offline and online reinforcement learning setting...

2007
Paulo Rogério Pereira António Grilo Francisco Rocha Mário Serafim Nunes Augusto Casaca Claude Chaudet Peter Almström Mikael Johansson

This paper presents a survey on transport and routing protocols for wireless sensor networks (WSN). Research challenges regarding the problem of end-to-end reliability are addressed in particular.

2010
John Kelsey Andrew Regenscheid Tal Moran David Chaum

In this paper, we develop methods for constructing votebuying/coercion attacks on end-to-end voting systems, and describe votebuying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter , and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionall...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید