نتایج جستجو برای: receive buffer blocking

تعداد نتایج: 182806  

2017
Takaki Waritani Jessica Chang Bonnie McKinney Kuniaki Terato

To assay serum antibodies by indirect ELISA, it is critical to eliminate a variety of false positive and negative reactions attributed to the principle. These include 1) the background (BG) noise reaction caused by hydrophobic binding of immunoglobulin components in sample specimens to solid surfaces, 2) false positive reaction caused by non-specific binding of immunoglobulins to target-antigen...

2006
Khalid A. Darabkh Ramazan Savas Aygün

Sequential decoders are convolutional channel decoders that are characterized by having variable decoding complexity in changing channel conditions. They are widely used in wireless packet-switching networks and mobile communications. The major difference of multimedia networks from traditional networks is the deadline to display or (play) the arriving packets. Especially, this is more obvious ...

Journal: :CoRR 2013
Russell Power

High performance networks (e.g. Infiniband) rely on zero-copy operations for performance. Zero-copy operations, as the name implies, avoid copying buffers for sending and receiving data. Instead, hardware devices directly read and write to application specified areas of memory. Since modern high-performance networks can send and receive at nearly the same speed as the memory bus inside machines...

2005
Lei Nie Ingo A. Hansen

A system analysis approach is presented for investigation of train operations in railway stations based on network, timetable and train detection data. The estimated blocking times, buffer times and track occupancies are compared with real operations data recorded automatically by track circuits. Statistical analysis of train operations between two Dutch major railway stations in The Hague clea...

2011
Ingrid Mur-Veeman Mark Govers

INTRODUCTION Bed-blocking problems in hospitals reflect how difficult and complex it is to move patients smoothly through the chain of care. In the Netherlands, during the first decade of the 21st century, some hospitals attempted to tackle this problem by using an Intermediate Care Department (ICD) as a buffer for bed-blockers. However, research has shown that ICDs do not sufficiently solve th...

Journal: :Computer Communications 1999
Wei Li Kia Makki Niki Pissinou E. K. Park Xiaohua Jia

This paper studies the behavior of performance evaluation for a personal communication services (PCS) network, in which the calls' arrival process may depend on the number of calls in the target cells. Each cell of the PCS network consists of a ®nite channel and a buffer (with ®nite or in®nite size) for handoff calls. The handoff calls having to wait in the buffer for further communication may ...

Journal: :Journal of experimental psychology. Animal behavior processes 2009
Jemma C Dopson John M Pearce Mark Haselgrove

In the blocking paradigm, subjects receive reinforced presentations of a compound, AX, after reinforced presentations of A alone. Following this training, responding to X is often diminished relative to a control group, which did not receive the prior training with A. Standard associative theories of learning such as the Rescorla-Wagner model (Rescorla & Wagner, 1972) explain this effect by ass...

2013
Sachin B. Jadhav Deepak Choudhary

MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet,the Internet threat takes a form of attack, targetting individuals users to gain control over network and data. Buffer overlow is one of the most occuring security vulnerability in c...

Journal: :Trans. Emerging Telecommunications Technologies 2015
Younghak Hwang Abhijit Saha Hanbit Choi Hyuk Lim Brownson O. Obele

This paper proposes a fountain-code-based multi-path transport protocol, called heterogeneous multi-path transport protocol (HMTP), and evaluates its performance. HMTP improves the throughput performance and path utilization of multi-homing wireless erasure networks. It solves the receive buffer blocking problem and eliminates the need for retransmissions and in-order packet delivery, both of w...

2005
Jelena Mišić Vojislav B. Mišić

We analyze the performance of E-limited scheduling in Bluetooth piconets under bursty traffic finite buffer case. We model joint probability distributions of uplink and downlink queues using the M [x]/G/1/K model with vacations and derive buffer blocking probabilities at slaves and at the master. We also derive access delays at slave uplink buffers. Analytical results are validated through simu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید