نتایج جستجو برای: fixed protocol
تعداد نتایج: 441915 فیلتر نتایج به سال:
This paper presents the design and implementation of RTEP (Real-Time Ethernet Protocol), which is a softwarebased token-passing Ethernet protocol for multipoint communications in real-time applications, that does not require any modification to existing Ethernet hardware. This protocol allows the designer to model and analyze the real-time application using it, because it is based on fixed prio...
چکیده : آرای صادره از دادگاه ها علاوه بر شیوه های عادی از طریق فوق العاده نیز قابل اعتراض و رسیدگی مجدد هستند. در مواقعی که رای دادگاه مخل به حقوق ثالث باشد وی می تواند به ان اعتراض کند. قلمرو شمول اعتراض ثالث به تصمیمات قضایی که از آن به رای تعبیر شده محدود می گردد. ولی در مورد قرارها که به اعدادی و نهایی تفکیک می شوند، چون هیچ رویه ثابت و مشخصی در این زمینه در دادگاهها وجود نداشته و همچنین ا...
Compared to fixed networks such as the Internet, mobile ad hoc networks (MANETs) present the routing protocol designer with many more challenges. In this paper we examine some of the tools used by designers to test their protocols. We propose that emulation of a mobile wireless network reduces the amount of time and effort in testing a routing protocol compared with either field testing or full...
This paper focuses on the economic desirability of the fixed and relatively short-term greenhouse gas targets and timetables in the Kyoto Protocol. The Protocol provides flexibility in which greenhouse gases to control, where control can be implemented, and what domestic policy measures are used. However, the Protocol does not allow much flexibility in when emission reductions take place in pur...
A distributed protocol is presented for anonymous and secure voting that is failure-tolerant with respect to malicious behavior of individual participants and that does not rely on a trusted third party. The proposed voting protocol was designed to be executed on a fixed group of N known participants, each of them casting one vote that may be a vote for abstention. Several attack vectors on the...
We revisit the password-based group key exchange protocol due to Lee et al. (2004), which carries a claimed proof of security in the Bresson et al. model under the intractability of the Decisional Diffie–Hellman problem (DDH) and Computational Diffie–Hellman (CDH) problem. We reveal a previously unpublished flaw in the protocol and its proof, whereby we demonstrate that the protocol violates th...
Medium Access Control (MAC) protocol is one of the key network protocols that ensure Wireless Sensor Networks (WSNs) maintain high performance during communication. MAC protocol design plays an important role in improving the performances of the whole network. First, Wireless Passive Sensor Networks (WPSNs) and MAC protocols are introduced in this paper. Second, some existing MAC protocols are ...
In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA) Medium Access Control (MAC) protocol utilizes th...
in this paper, we prove some approximate fixed point results for proximinal valued $beta$-contractive multifunctions on metric spaces. we show that our results generalize some old fixed point results in the literature.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید