نتایج جستجو برای: keywords proxy war
تعداد نتایج: 2039825 فیلتر نتایج به سال:
this article investigates the end-to-end TCP performance in the scenario where WCDMA is employed as the access link. Unlike previous work, we incorporate the impact of Internet loss rate and delay into the study. The performance of TCP over WCDMA is studied from several aspects: the TCP protocol configurations, the different variant of TCP protocols, the interaction of TCP and RLC layer protoco...
Many cities in the Global South are structurally different from Northern, particularly American, on which much of urban sociology’s conceptual apparatus has been based. Thus, depicting them terms a standard vocabulary risks imposing an inappropriate way seeing. We need that is able to accommodate their experience. This special issue contributes work building vocabulary. select five keywords soc...
A Public Key Encryption is a technique of encrypting the message using public keys so that the message is secure against various attacks. A Keyword based Public Key Encryption is a new way of providing security against various attacks. Although there are various keyword searches based public key encryption techniques are implemented. Here in this paper a survey of all the techniques based on Ke...
This paper examines an approach to spam mitigation that rate limits incoming TCP/IP connections to an SMTP server based on the real-time detection of spam within the SMTP message exchange. Our approach is motivated by a desire to cause increased resource consumption at the spammer end of each SMTP connection, and to avoid the negative impact of falsepositives by eventually allowing all emails t...
In this paper, discuss about the Web Caching technique, Web caching is a familiar technique for reducing access latencies and bandwidth consumption. It is reducing server loads, client request latencies, and network traffic. The paper described the basic Cache Models like front-end, Data end and Distributed Cache application design scenario. The paper explain about the advantage of the web Cach...
The paper addresses the TCP performance enhancing proxy techniques broadly deployed in wireless networks. Drawing on available models for TCP latency, we describe an analytical model for the latency and the buffer requirements related to the split-TCP mechanism. Although the model applicability is broad, we present and evaluate the model in the context of geostationary satellite networks, where...
We present an implementation of a faulttolerant TCP (FT-TCP) that allows a faulty server to keep its TCP connections open until it either recovers or it is failed over to a backup. The failure and recovery of the server process are completely transparent to client processes connected with it via TCP. FT-TCP does not affect the software running on a client, does not require to change the server’...
in this paper i develop a proxy means tests (pmt) model and examine several targeting lines based on 2008 household survey data to identify beneficiaries for a targeting subsidy scheme in iran. based on the findings of this study, setting a cut-off percentile of 40% is expected to provide compensation for almost 70 percent of the poorest households. this will result in the highest accuracy main...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید