نتایج جستجو برای: keywords proxy war

تعداد نتایج: 2039825  

2007
Liang Hu

this article investigates the end-to-end TCP performance in the scenario where WCDMA is employed as the access link. Unlike previous work, we incorporate the impact of Internet loss rate and delay into the study. The performance of TCP over WCDMA is studied from several aspects: the TCP protocol configurations, the different variant of TCP protocols, the interaction of TCP and RLC layer protoco...

Journal: :The Open Automation and Control Systems Journal 2015

Journal: :City & Community 2021

Many cities in the Global South are structurally different from Northern, particularly American, on which much of urban sociology’s conceptual apparatus has been based. Thus, depicting them terms a standard vocabulary risks imposing an inappropriate way seeing. We need that is able to accommodate their experience. This special issue contributes work building vocabulary. select five keywords soc...

2015
Pooja Dubey Amit Saxena

A Public Key Encryption is a technique of encrypting the message using public keys so that the message is secure against various attacks. A Keyword based Public Key Encryption is a new way of providing security against various attacks. Although there are various keyword searches based public key encryption techniques are implemented. Here in this paper a survey of all the techniques based on Ke...

2004
Minh Tran Grenville Armitage

This paper examines an approach to spam mitigation that rate limits incoming TCP/IP connections to an SMTP server based on the real-time detection of spam within the SMTP message exchange. Our approach is motivated by a desire to cause increased resource consumption at the spammer end of each SMTP connection, and to avoid the negative impact of falsepositives by eventually allowing all emails t...

2012
Amit K. Chauhan Vineet Chauhan

In this paper, discuss about the Web Caching technique, Web caching is a familiar technique for reducing access latencies and bandwidth consumption. It is reducing server loads, client request latencies, and network traffic. The paper described the basic Cache Models like front-end, Data end and Distributed Cache application design scenario. The paper explain about the advantage of the web Cach...

2001
M. Karaliopoulos R. Tafazolli

The paper addresses the TCP performance enhancing proxy techniques broadly deployed in wireless networks. Drawing on available models for TCP latency, we describe an analytical model for the latency and the buffer requirements related to the split-TCP mechanism. Although the model applicability is broad, we present and evaluate the model in the context of geostationary satellite networks, where...

2001
Lorenzo Alvisi Thomas C. Bressoud Ayman El-Khashab Keith Marzullo Dmitrii Zagorodnov

We present an implementation of a faulttolerant TCP (FT-TCP) that allows a faulty server to keep its TCP connections open until it either recovers or it is failed over to a backup. The failure and recovery of the server process are completely transparent to client processes connected with it via TCP. FT-TCP does not affect the software running on a client, does not require to change the server’...

Journal: :iranian journal of economic studies 2013
mohammad bakhshoodeh

in this paper i develop a proxy means tests (pmt) model and examine several targeting lines based on 2008 household survey data to identify beneficiaries for a targeting subsidy scheme in iran. based on the findings of this study, setting a cut-off percentile of 40% is expected to provide compensation for almost 70 percent of the poorest households. this will result in the highest accuracy main...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید