نتایج جستجو برای: access bridge

تعداد نتایج: 377701  

1997
Arno Formella Thomas Rauber

We give a brief survey of the SB-PRAM architecture as a realization of the priority CRCW PRAM model. The sequential semantics of a parallel program allows the use of classical techniques to prove its correctness. The SB-PRAM shows good performance and speedup for the presented ve scientiic applications which are| due to their irregular behavior|diicult to parallelize eeciently on other parallel...

Journal: :Human Technology: An Interdisciplinary Journal on Humans in ICT Environments 2007

Journal: :International Journal on Informatics for Development: IJID 2022

The security hole in the android operating system sometimes not realized by users such as malware and exploitation third parties to remote access. This study conducted identify vulnerabilities of using Ghost Framework. vulnerability smartphone are found Android Debug Bridge (ADB) with method well analyze test results access Trojan attacks. several steps from preparing tools connecting testing c...

Journal: :Ad Hoc & Sensor Wireless Networks 2015
Hamidreza Tavakoli Jelena V. Misic Majid Naderi Vojislav B. Misic

In this paper, we analyze CSMA-CA access for interconnection of IEEE 802.15.4 beacon enabled network clusters using ordinary network nodes as bridge nodes. Bridge design involves uplink transmission to the coordinator and downlink transmission to the bridge. Bridge periodically visits upper and lower clusters and exchanges data using CSMACA access. We develop the queuing model for bridging algo...

1998
Andreas Paul Jochen Röhrig

We give a description of a C++ implementation of a dynamic parallel list developed for the SB-PRAM, a massively parallel scalable shared memory computer. We show that access time on the elements stored in the parallel list is comparable with that of a sequential list. The implementation can easily be ported to other shared memory platforms supporting fast locking mechanisms and parallel prefix ...

2013
Pavel Lafata

The second generation of Very-High Speed Digital Subscriber Lines (VDSL2) represents a modern high-speed solution for present last-mile access networks. However, the transmission performance of VDSL2 lines is heavily dependent on the real conditions of symmetrical pairs and quads in local metallic lines and cables. One of the frequent elements in metallic access networks, which can negatively i...

ژورنال: پیاورد سلامت 2014
اباذری, فاطمه , رنگرز جدی, فاطمه, مروجی, علیرضا,

 Background and Aim: Evidence Based Medicine (EBM) is the explicit use of current best evidence in making decisions about the care of individual patients. Hospital information system (HIS) can act as a bridge between medical data and medical knowledge through merging of patient's data, individual clinical knowledge and external evidences .The aim of this research was to determine the Capab...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

2005
ZHANG Shaomin WANG Baoyi

Organizations use PKI (Public Key Infrastructures) to support internal business processes, but some businesses have industrial partnerships with others, and these alliances can exploit B2B (Business to Business) e-commerce capabilities by connecting corporate PKI. The paper deals with two methods to realize access control in extended organization PKI business processes: BCAs (Bridge Certificati...

2013
Zoltán Farkas Péter Kacsuk Ákos Balaskó Krisztián Karóczkai Mark Santcroos Sílvia Delgado Olabarriaga

The nature of data for scientific computation is very diverse in the age of big data. First, it may be available at a number of locations, e.g. the scientist’s machine, some institutional filesystem, a remote service, or some sort of database. Second, the size of the data may vary from a few kilobytes to many terabytes. In order to be available for computation, data has to be transferred to the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید