نتایج جستجو برای: steps
تعداد نتایج: 131161 فیلتر نتایج به سال:
Signaling layer protocols specified within the Next Steps in Signaling (NSIS) framework may rely on the General Internet Signaling Transport (GIST) protocol to handle authorization. Still, the signaling layer protocol above GIST itself may require separate authorization to be performed when a node receives a request for a certain kind of service or resources. This document presents a generic mo...
This document gives an overview of the Next Steps in Signaling (NSIS) framework and protocol suite created by the NSIS Working Group during the period of 2001-2010. It also includes suggestions on how the industry can make use of the new protocols and how the community can exploit the extensibility of both the framework and existing protocols to address future signaling needs.
This document gives an overview of the Next Steps in Signaling (NSIS) framework and protocol suite created by the NSIS Working Group during the period of 2001-2010. It also includes suggestions on how the industry can make use of the new protocols and how the community can exploit the extensibility of both the framework and existing protocols to address future signaling needs.
This threats document provides a detailed analysis of the security threats relevant to the Next Steps in Signaling (NSIS) protocol suite. It calls attention to, and helps with the understanding of, various security considerations in the NSIS Requirements, Framework, and Protocol proposals. This document does not describe vulnerabilities of specific parts of the NSIS protocol suite.
This threats document provides a detailed analysis of the security threats relevant to the Next Steps in Signaling (NSIS) protocol suite. It calls attention to, and helps with the understanding of, various security considerations in the NSIS Requirements, Framework, and Protocol proposals. This document does not describe vulnerabilities of specific parts of the NSIS protocol suite.
A consistent result in the evaluation of group-delivered intervention to promote social reciprocity in children with PDDs is that outcome data are inconclusive. Lack of robust evidence of efficacy confounds understanding of these interventions and their value to the field. It is conceivable that the construct of impaired social reciprocity in PDD presents unique circumstances that require speci...
RSVP version 1 has been designed for optimally support multicast. However, in reality multicast is being used much less frequently than anticipated. Still, even for unicast (one sender, one receiver) communication, full−fledged multicast−enabled RSVP signaling must be used. As pointed out in the NSIS requirement draft, multicast would not be necessarily required for an NSIS signaling protocol. ...
• Significant correlations between age group and performance for FRs (r=0.55, p<0.001) and PDDs (r=0.56, p<0.001). 2. Truth-Value Judgment Task Methods •Participants: 4yo (18), 5yo (17), 6yo (19), 7yo (11). •Participants were told: “Cookie Monster really likes cookies, but he does NOT like onions.” They were shown pictures of (i) plates of cookies, (ii) onions, or (iii) both cookies and onions....
This paper investigates the issue of enabling scalable quantitative delay guarantee support in DiffServ networks through NSIS. A NSIS QoS Model is utilized to add the admission control framework to the DiffServ architecture and reservation-based admission control algorithms are designed for ingress and interior nodes respectively for enabling quantitative delay guarantees in a DiffServ domain. ...
Interacting with toys and other people is fundamental for developing social communication skills. However, children with autism spectrum disorder (ASD) are characterized by having a significant impairment in social interaction, which often leads to deficits in play skills. For this reason, methods of teaching play skills to young children with ASD have been well documented. Although previous st...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید