نتایج جستجو برای: telecommunication system
تعداد نتایج: 2237004 فیلتر نتایج به سال:
چکیده ندارد.
In this paper, we made the plan of a load testing, and got results by means of the LoadRunner which is an automatic load testing tool. We combined with the characteristics of electronic commerce system and did the load testing and analysis the result of load test by means of the LoadRunner. We fully described the characteristics of the electronic commerce application, designed the reasonable te...
Non-repudiation is a security service that provides cryptographic evidence to support the settlement of disputes. In this paper, we introduce the state-of-the-art of non-repudiation protocols for multiple entities. We extend an existing multi-party non-repudiation (MPNR) protocol to allow an originator to send different messages to many recipients in a single transaction. We further propose an ...
In this article, we describe an approach for computing the current trust level of individual users towards an online system and present initial validation results from a small-scale experiment. This trust computational model relies upon survey research for identifying the set of key trust attributes and grouping users into four segments of expected behaviors. Each user’s initial trust level is ...
This paper presents a partial implementation of the ES-IS Routing Information Exchange Protocol packet processing in Linux Kernel 2.6, which is for use in conjunction with the Connectionless Network Protocol (CLNP) in Aeronautical Telecommunication Network (ATN). First, we show the data structures involved in the protocol operation. Second, we describe the map of the packet processing whose des...
چکیده ندارد.
Message from the Program Co-Chair Conference Committee Program Committee Supported by Patroned by Continuous Engineering of Information and Communication Infrastructures Architecture and Functions of a Commercial Software Reengineering Workbench p. 2 Control Flow Normalization for COBOL/CICS Legacy System p. 11 A Generic Approach for Data Reverse Engineering taking into Account Application Doma...
A secure roaming protocol for mobile networks is proposed. Roaming has been analysed in some schemes from the security point of view; however, there are vulnerabilities in most of them and so the claimed security level is not achieved. The scheme offered by Wan et al. recently is based on hierarchical identity-based encryption, in which the roaming user and the foreign network mutually authenti...
We present a method for low loss coupling of multiple fibers to optical waveguides. Simultaneous alignment of multiple fibers is done by placing the fibers in a V-groove array. Coupling efficiency can be enhanced by placing a high numerical aperture (HNA) fiber (MFD 4 μm) between the standard telecom fiber and a horizontal tapered waveguide. The splicing loss between the standard telecom fiber ...
This paper introduces an intelligent system that performs alarm correlation and root cause analysis. The system is designed to operate in largescale heterogeneous networks from telecommunications operators. The proposed architecture includes a rules management module that is based in data mining (to generate the rules) and reinforcement learning (to improve rule selection) algorithms. In this w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید