نتایج جستجو برای: stub node

تعداد نتایج: 171683  

Journal: :EURASIP J. Wireless Comm. and Networking 2011
Abdol Kalteh Gholamreza Dadashzadeh Mohammad Naser-Moghadasi

The design and analysis of an ultra wideband aperture antenna with dual-band-notched characteristics are presented. The proposed antenna consists of a circular ring exciting stub on the front side and a circular slot on the back ground plane. By utilizing a parasitic strip and a T-shaped stub on the antenna structure, two notched bands of 850 MHz (3.5-4.35 GHz) and 900 MHz (5.05-5.95 GHz) are a...

2012
Mustafa H. B. Ucar Adnan Sondas Yunus E. Erdemli

A compact printed wide-slot (PWS) antenna is proposed for UWB applications. The proposed UWB-PWS antenna basically consists of a stepped microstrip feed-line with a rectangular patch stub and a rectangular wide-slot element at the aperture. Additional parasitic split-ring elements are placed along the patch stub to achieve notch-band characteristics. As the proposed antenna in absence of the ri...

2012
Kenji FUJIKAWA Yasunaga KOBARI Hiroaki HARAI

We redefine an address, which is location information within the Internet, as a locator, and propose a HANA protocol, which hierarchically and automatically allocates and assigns locators to network equipments. From the Internet core to stub networks, HANA can reduce manual configurations of network equipments related to locators as possible, and then can reduce network management costs. Even i...

2015
Matthew Fernandez June Andronick Gerwin Klein Ihor Kuz

Formal verification has been successfully applied to provide strong correctness guarantees of software systems, but its application to large code bases remains an open challenge. The technique of component-based software development, traditionally employed for engineering benefit, also aids reasoning about such systems. While there exist compositional verification techniques that leverage the s...

Journal: :Computer Communications 2003
Bernd Lamparter Krishna Paul Dirk Westhoff

Wired equivalent security is difficult to provide in ad hoc networks due to high dynamics, wireless link vulnerability, and requirement of complete decentralization. Especially mutual authentication among nodes in a self-organized mode of ad hoc network, where a single definition of trust is hard to build, is very difficult. This leads to several loopholes in previously established security arc...

Journal: :Bulletin of the World Health Organization 2012
Jeffrey Wigand

Dr Jeffrey Wigand is delivering an anti-smoking message to children and young people. He talked to Ben Jones about his work.

Journal: :Computer Communications 2004
Bruno Quoitin Sébastien Tandel Steve Uhlig Olivier Bonaventure

Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of packets between domains. In this paper, we focus on the needs of stub ISPs that compose 80% of the global Internet. We first describe the typical traffic pattern of such a stub ISP. Then we briefly describe the methods tha...

2007
Stylianos Georgoulas George Pavlou Panos Trimintzios Kin-Hon Ho

Differentiated Services (DiffServ) are seen as the technology to support Quality of Service (QoS) in IP networks in a scalable manner by allowing traffic aggregation within the engineered traffic classes. In DiffServ domains, admission control additionally needs to be employed in order to control the amount of traffic into the engineered traffic classes so as to prevent overloads that can lead ...

2006
Jong-Hoon Lee Manos M. Tentzeris

In this paper, various topologies of feeding structures are comparatively evaluated for 60 GHz three dimensional (3D) integrated cavity resonators used in 3D integrated RF modules. Three excitation techniques (slot excitation with a shorting via, slot excitation with a λg/4 open stub, probe excitation) have been evaluated using simulated and measured data. The probe excitation is demonstrated a...

2007
Mohamad-Reza AndalibiZadeh Mohammad Hossein Eslami

The frozen code compression technique divides the unexecuted kernel code into single-entry partitions that are stored in compressed form, and replaced by stubs in the code. When control flow enters a stub, a special routine is invoked that allocates space and expands the corresponding code fragment, after which the stub is overwritten with a direct jump to the decompressed code. Once decompress...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید