نتایج جستجو برای: 60 mineach session

تعداد نتایج: 345193  

Journal: :RFC 2012
Qin Wu Frank Xia Roni Even

In a large RTP session using the RTP Control Protocol (RTCP) feedback mechanism defined in RFC 4585, a feedback target may experience transient overload if some event causes a large number of receivers to send feedback at once. This overload is usually avoided by ensuring that feedback reports are forwarded to all receivers, allowing them to avoid sending duplicate feedback reports. However, th...

2015
Rafael Manfro Vinícius Fabris Gislaine Felipe Garcia Marcelo Carlos Bortoluzzi

The article presentsa case of mandible fracturecaused by the lossof an implantina protocolprosthesis increasingcantilever, causingbone lossaround the implant. The fracturewas treatedbyrigid fixation, fourimplantsanda new prosthesis. The authors discuss the possible causes and prevention of this complication.

Journal: :RFC 2011
Shunsuke Okumura Takuya Sawada Paul H. Kyzivat

The Session Initiation Protocol (SIP) utilizes the offer/answer model to establish and update multimedia sessions using the Session Description Protocol (SDP). The description of the offer/answer model in SIP is dispersed across multiple RFCs. This document summarizes all the current usages of the offer/answer model in SIP communication.

2014
Sven Bambach John M. Franchak David J. Crandall Chen Yu

Understanding visual attention in children could yield insight into how the visual system develops during formative years and how children’s overt attention plays a role in development and learning. We are particularly interested in the role of hands and hand activities in children’s visual attention. We use headmounted cameras to collect egocentric video and eye gaze data of toddlers during pl...

2017
OSBORNE HALL

s submitted, as the best representatives we have this year of interdisciplinary team process and content. These are our winning projects. In this session, each team will highlight the interdisciplinary approaches they found useful. They will also identify the interdisciplinary issues and problems that they encountered. Please note that the research findings will not be emphasized in this sessio...

Journal: :IACR Cryptology ePrint Archive 2011
Douglas R. Stinson

Cichon, Golebiewski and Kutylowski ([2]) proposed a technique for “key redistribution” in sensor networks. The idea is that long-term keys held by the sensor nodes are used to encrypt temporal keys that a base station then broadcasts to the network. The temporal keys are used as session keys by the nodes in the sensor network. It is argued that this provides increased connectivity and resilienc...

Journal: :CoRR 2017
Ahmed Arafa Sennur Ulukus

We consider an energy harvesting source that is collecting measurements from a physical phenomenon and sending updates to a destination within a communication session time. Updates incur transmission delays that are function of the energy used in their transmission. The more transmission energy used per update, the faster it reaches the destination. The goal is to transmit updates in a timely m...

Journal: :Applied microbiology 1974
J F McConville C B Anger D W Anderson

An aqueous diluent containing Tween 60 and Arlacel 80 gave greater recovery of microorganisms when compared with two common diluents as determined by aerobic plate count of inoculated anhydrous cosmetics. The greater recovery was caused by better dispersion of the anhydrous cosmetics in the diluents.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید