نتایج جستجو برای: access tunnel

تعداد نتایج: 361847  

2014
Nicholas De Lucca Stanislav Gordeyev Adam Smith Eric Jumper Matthew Whiteley

Wavefront measurements of a turbulent boundary layer were performed at the University of Notre Dame. Optical access windows to the tunnel were instrumented with 16 accelerometers to measure the tunnel-induced vibrations in the optical windows. A combination of spectral Proper Orthogonal Decomposition (POD) and Linear Stochastic Estimation (LSE) were used to remove vibration induced effects in t...

2004
P. Chatzimisios A. C. Boucouvalas

IEEE 802.11 Medium Access Control (MAC) protocol employs two techniques for packet transmission; the basic access scheme and the RTS/CTS reservation scheme. In this paper, we carry out an analysis in order to derive an all-purpose expression for the threshold value, which determines when the RTS/CTS scheme should be employed, under ideal channel conditions without the presence of hidden station...

2017
Martin Rabellino Guillermo J Rosa-Diez Sergio A Shinzato Pablo Rodriguez Oscar A Peralta Maria S Crucelegui Rosario Luxardo Agustina Heredia-Martinez Mariela I Bedini-Rocca Ricardo D García-Mónaco

INTRODUCTION AND PURPOSE The increasing number of patients undergoing hemodialysis and the limited number of access sites have resulted in an increasing number of techniques to maintain vascular access for hemodialysis. Thrombosed arteriovenous (AV) fistulas with large venous aneurysms have poor treatment results, with both endovascular and surgical techniques, leading to a high rate of definit...

Journal: :RFC 2000
Glen Zorn Bernard Aboba David Mitton

Many applications of tunneling protocols such as PPTP [5] and L2TP [4] involve dial-up network access. Some, such as the provision of secure access to corporate intranets via the Internet, are characterized by voluntary tunneling: the tunnel is created at the request of the user for a specific purpose. Other applications involve compulsory tunneling: the tunnel is created without any action fro...

2017
Fatih Karaaslan Sinan Karaoğlu

This open-access article is published and distributed under the Creative Commons Attribution NonCommercial No Derivatives License (http://creativecommons.org/licenses/by-nc-nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article witho...

2000
I. I. Oleinik

Magnetic tunnel junctions (MTJ) are promising candidates for applications in spintronic devices such as magnetic random access memories, read heads and sensors [1]. The MTJs consist of two ferromagnetic layers separated by an insulating barrier layer. The physical quantity measured for signal detection is the tunnelling magnetoresistance (TMR), i.e. the relative difference in the resistance bet...

2017
Efe Turgay Almut Höger Jens Figiel Philip Roessler Karl-Friedrich Schüttler Ali Seif

This open‐access article is published and distributed under the Creative Commons Attribution ‐ NonCommercial ‐ No Derivatives License (http://creativecommons.org/licenses/by‐nc‐nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article w...

Journal: :RFC 2003
Baiju V. Patel Bernard Aboba Scott G. Kelly Vipul Gupta

This memo explores the requirements for host configuration in IPsec tunnel mode, and describes how the Dynamic Host Configuration Protocol (DHCPv4) may be leveraged for configuration. In many remote access scenarios, a mechanism for making the remote host appear to be present on the local corporate network is quite useful. This may be accomplished by assigning the host a "virtual" address from ...

2008
J. Z. Sun D. C. Ralph

We comment on both recent progress and lingering puzzles related to research on magnetic tunnel junctions (MTJs). MTJs are already being used in applications such as magnetic-field sensors in the read heads of disk drives, and they may also be the first device geometry in which spin-torque effects are applied to manipulate magnetic dynamics, in order to make non-volatile magnetic random access ...

2017
Dhong Won Lee Hyeuk Woo Choi Jin Goo Kim

We describe a surgical technique for arthroscopic posterior cruciate ligament (PCL) reconstruction with remnant preservation of the original PCL fibers using a posterior trans-septal portal approach. Using the transtibial technique and the posterior trans-septal portal approach allows good visualization of the tibial tunnel preparation, easy access to the tibial tunnel without neurovascular inj...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید