نتایج جستجو برای: second tier nodes
تعداد نتایج: 743300 فیلتر نتایج به سال:
We propose a next generation Internet architecture that will allow natural sharing of resources among multiple organizations by dynamically reconfiguring and creating a virtual network for a particular application. Our architecture called "Internet 3.0" consists of a 3-tier object model. The bottom tier consists of a high-speed network infrastructure owned by multiple ISPs. The second tier cons...
This essay surveys the need for a clear and objective definition of medical futility. It is urged that once agreement is obtained for structuring operational guidelines for determining futility, a three-tier decisional structure can be developed for testing whether a given treatment falls within the scope of these guidelines. Under the first tier, the treating physician would be given the prima...
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both rational behaviors when nodes arbitrarily deviate from the protocol for their local benefit and Byzantine behaviors when a broken, misconfigured, or malicious node arbitrarily deviates from the protocol for any other reason. T...
We present an interprocedural ow-insensitive points-to analysis algorithm based on monomorphic type inference. The source language model the important features of C including pointers, pointer arithmetic, pointers to functions, structured objects, and unions. The algorithm is based on a non-standard type system where types represent nodes and edges in a storage shape graph. This work is an exte...
Modern Internet services employ a multi-tier architecture. While facilitating flexible service deployment, the tiered architectures introduce several significant challenges. Complex inter-tier dependencies and dynamic bottleneck tier shift are challenges inherent to multi-tier architectures. Highly dynamics of session-oriented Internet workloads further magnifies the complexity of multi-tier In...
Security is very critical parameter in sensor networks. Securing the WSN needs to make the network support every security property. Security attack is a concern for wireless sensor networks because of usage of very low capacity devices in the systems and physical accessibility to sensor nodes. Therefore to prevent confidential information from being stolen, it is important to provide secure com...
This paper proposed a three-tier Proxy Agent working as a mediator between the users and the backend process of a FAQ system. The first tier makes use of an improved sequential patterns mining technique to propose effective query prediction and cache services. The second tier employs an ontology-supported case-based reasoning technique to propose adapted query solutions and tune itself by retai...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید