نتایج جستجو برای: second tier nodes

تعداد نتایج: 743300  

2006

Peer-to-peer (P2P) computing has been hailed as a promising technology that will reconstruct the architecture of distributed computing (e.g., the Internet). This is because it can harness various resources (including computation, storage and bandwidth) at the edge of the Internet with lower cost of ownership, and at the same time enjoy many potential desirable features (e.g., scalability, auton...

Journal: :Transportation Science 2017
Elena Tappia Debjit Roy René M. B. M. de Koster Marco Melacini

Shuttle-based compact systems are new automated multi-deep unit-load storage systems with lifts that promise both low operational cost and large volume flexibility. In this paper, we develop novel queuing network models to estimate the performance of both single-tier and multi-tier shuttle-based compact systems. Each tier is modeled as a multi-class semiopen queuing network, whereas the vertica...

2016
A. Senthil Kumar E. Logashanmugam

The Three Tier Security Scheme for Wireless Sensor Networks (WSNs) was introduced basically to improve the cost efficiency of the system. This is because the incorporation of asymmetric keys increases the computational and memory costs. But, the cost of key pre distribution schemes is low and they provide secure communication between Sensor Nodes (SNs) and mobile sinks. However, Pair wise key e...

Journal: :Proceedings. Biological sciences 2009
George Wittemyer John B A Okello Henrik B Rasmussen Peter Arctander Silvester Nyakaana Iain Douglas-Hamilton Hans R Siegismund

Hierarchical properties characterize elephant fission-fusion social organization whereby stable groups of individuals coalesce into higher order groups or split in a predictable manner. This hierarchical complexity is rare among animals and, as such, an examination of the factors driving its emergence offers unique insight into the evolution of social behaviour. Investigation of the genetic bas...

2001
Robert van Kommer Beat Hirsbrunner

In voice-activated teleservices, two types of speech recognition systems are commonly used, (tri)phone-based and wholeword model recognizers. While the first type of systems exhibits a convenient implementation to recognize any new vocabulary word, the second achieves a higher performance level when the necessary and specific training data is available. In order to bridge the performance gap be...

2017
Mai Ha Vu

This paper is a formal study of a simplified version of Negative Polarity Item (NPI) licensing requirements in two languages, English and Hungarian. In the framework of Model-Theoretic Syntax, using logical formalisms defined over tree-languages, I show that neither pattern can be described with Tierbased Strictly Local (TSL) constraints only, and suggest that they need a more complex logical f...

2003
Graeme Stevenson Paddy Nixon Robert Ian Ferguson

It is important to note that the need to support ad-hoc and potentially mobile arrangements of devices in ubiquitous environments does not fit well within the traditional client/server architecture. We believe peer-to-peer communication offers a preferable alternative due to its decentralised nature, removing dependence on individual nodes. However, this choice adds to the complexity of the dev...

2003
Ittai Abraham Dahlia Malkhi Oren Dobzinski

This paper proposes the first peer-to-peer network and lookup algorithm that has worst case constant distortion. The construction uses a constant expected number of links. The design lends itself to dynamic deployment, and has a simple and easy to verify proof. The construction embraces the two-tier architecture of current peer-to-peer networks, where stronger and stable nodes serve as ultra-pe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید