نتایج جستجو برای: second tier nodes

تعداد نتایج: 743300  

2010
Subharthi Paul Raj Jain Jianli Pan

We propose a next generation Internet architecture that will allow natural sharing of resources among multiple organizations by dynamically reconfiguring and creating a virtual network for a particular application. Our architecture called "Internet 3.0" consists of a 3-tier object model. The bottom tier consists of a high-speed network infrastructure owned by multiple ISPs. The second tier cons...

Journal: :Journal of palliative care 1995
G P Smith

This essay surveys the need for a clear and objective definition of medical futility. It is urged that once agreement is obtained for structuring operational guidelines for determining futility, a three-tier decisional structure can be developed for testing whether a given treatment falls within the scope of these guidelines. Under the first tier, the treating physician would be given the prima...

2005
Jean-Philippe Martin Amitanand S. Aiyer Lorenzo Alvisi Allen Clement Michael Dahlin Carl Porth

This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both rational behaviors when nodes arbitrarily deviate from the protocol for their local benefit and Byzantine behaviors when a broken, misconfigured, or malicious node arbitrarily deviates from the protocol for any other reason. T...

1996
Bjarne Steensgaard

We present an interprocedural ow-insensitive points-to analysis algorithm based on monomorphic type inference. The source language model the important features of C including pointers, pointer arithmetic, pointers to functions, structured objects, and unions. The algorithm is based on a non-standard type system where types represent nodes and edges in a storage shape graph. This work is an exte...

2011
Sireesha Muppala

Modern Internet services employ a multi-tier architecture. While facilitating flexible service deployment, the tiered architectures introduce several significant challenges. Complex inter-tier dependencies and dynamic bottleneck tier shift are challenges inherent to multi-tier architectures. Highly dynamics of session-oriented Internet workloads further magnifies the complexity of multi-tier In...

2012
Dinesh Singh Parvinder Singh Vikram Singh

Security is very critical parameter in sensor networks. Securing the WSN needs to make the network support every security property. Security attack is a concern for wireless sensor networks because of usage of very low capacity devices in the systems and physical accessibility to sensor nodes. Therefore to prevent confidential information from being stolen, it is important to provide secure com...

Journal: :Expert Syst. Appl. 2009
Sheng-Yuan Yang Chun-Liang Hsu

This paper proposed a three-tier Proxy Agent working as a mediator between the users and the backend process of a FAQ system. The first tier makes use of an improved sequential patterns mining technique to propose effective query prediction and cache services. The second tier employs an ontology-supported case-based reasoning technique to propose adapted query solutions and tune itself by retai...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید