نتایج جستجو برای: header

تعداد نتایج: 2673  

2004
R. Mahy B. Biggs R. Dean

This document defines a new header for use with Session Initiation Protocol (SIP) multi-party applications and call control. The Replaces header is used to logically replace an existing SIP dialog with a new SIP dialog. This primitive can be used to enable a variety of features, for example: "Attended Transfer" and "Call Pickup". Note that the definition of these example features is nonnormative.

Journal: :J. Inf. Sci. Eng. 2009
Wen-Jyi Hwang Chien-Min Ou

In this paper, an efficient FPGA-based header classification circuit is proposed for network intrusion detection system (NIDS). The circuit is based on simple shift registers and symbol encoders for the fast packet header classification in hardware. As compared with related work, experimental results show that the proposed work achieves higher throughput and less hardware resource in the FPGA i...

2000
Colin Perkins Jon Crowcroft

We discuss the use of interleaving as a bandwidth efficient means of protecting audio streams from the effects of packet loss in the Internet. The adverse effects of interleaving on IP/UDP/RTP header compression are noted and a number of schemes which remedy this problem are discussed. Keywords— RTP, Interleaving, Voice-over-IP, header compression.

2008
L. Y. Chan L. F. K. Lui Lixin Xu H. Y. Tam

We demonstrated a 1 4 all-optical packet switch with all-optical header processing at a header rate of 5 Gb/s and payload rate of 10 Gb/s using injection-locking in a single Fabry–Pérot laser diode at each output port of the switch.

Journal: :Maritime economics and logistics 2021

Due to a technical error the header of equation 1 has been broken in PDF version this article. It should read.

Journal: :Circulation: Arrhythmia and Electrophysiology 2013

Journal: :Egyptian Journal of Agricultural Research 2012

Journal: :Journal of Dynamic Systems, Measurement, and Control 2013

2000
Christian F. Tschudin

We describe a steganographic protocol for packet switched networks that is based on the dynamic rewriting of packet headers. The protocol provides confidentiality without encryption based on Rivest’s “chaffing and winnowing” technique. We identify new places in computer networks where this method can be applied and describe an alternate chaffing method that relies on unpredictable number sequen...

Journal: :Journal of Software Maintenance 2009
Diomidis Spinellis

A number of widely used programming languages use lexically included files as a way to share and encapsulate declarations, definitions, code, and data. As the code evolves files included in a compilation unit are often no longer required, yet locating and removing them is a haphazard operation, which is therefore neglected. The difficulty of reasoning about included files stems primarily from t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید