標(biāo)題: Titlebook: Computer Networks, Architecture and Applications; Proceedings of the I S. V. Raghavan (Co-Chairs),Bijendra N. Jain (Co-Ch Conference procee [打印本頁(yè)] 作者: 營(yíng)養(yǎng)品 時(shí)間: 2025-3-21 19:15
書目名稱Computer Networks, Architecture and Applications影響因子(影響力)
書目名稱Computer Networks, Architecture and Applications影響因子(影響力)學(xué)科排名
書目名稱Computer Networks, Architecture and Applications網(wǎng)絡(luò)公開度
書目名稱Computer Networks, Architecture and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Networks, Architecture and Applications被引頻次
書目名稱Computer Networks, Architecture and Applications被引頻次學(xué)科排名
書目名稱Computer Networks, Architecture and Applications年度引用
書目名稱Computer Networks, Architecture and Applications年度引用學(xué)科排名
書目名稱Computer Networks, Architecture and Applications讀者反饋
書目名稱Computer Networks, Architecture and Applications讀者反饋學(xué)科排名
作者: Frequency 時(shí)間: 2025-3-21 22:58 作者: 過(guò)度 時(shí)間: 2025-3-22 03:33
Walther von der Vogelweide 51, 13: , link bandwidth and node buffers, to transport data over the edges. The data directionality and data rate information are part of user level . to graph structured channels in the network, and allow the network to effectively ‘micro-manage’ the resources. This becomes desirable, particularly with a 作者: Liability 時(shí)間: 2025-3-22 06:12 作者: ear-canal 時(shí)間: 2025-3-22 09:02
A Study of Bandwidth Allocation Strategies for Interactive Image Applicationsscheme. Moreover, the average transfer times achieved with the HBH scheme are much lower. However, the variation of the transfer time is very small with the HRR scheme. We also show that the HBH scheme may be used to effectively trade transfer time vs image quality.作者: nominal 時(shí)間: 2025-3-22 12:54
Mean End-to-End Packet Delays in Hybrid Integrated Services Networks between packet bursts and link availability, yielding packet delays less than what would be expected on the grounds of burstiness, and causing the Poisson process based approximation to overestimate mean packet delay. At higher circuit loads the active circuits occupy fewer hops, and the correlatio作者: nominal 時(shí)間: 2025-3-22 20:27
Communication Channels for Data Multicasting in Multi-service Networks, link bandwidth and node buffers, to transport data over the edges. The data directionality and data rate information are part of user level . to graph structured channels in the network, and allow the network to effectively ‘micro-manage’ the resources. This becomes desirable, particularly with a 作者: Hallowed 時(shí)間: 2025-3-22 23:21 作者: Boycott 時(shí)間: 2025-3-23 04:08 作者: 抓住他投降 時(shí)間: 2025-3-23 09:06 作者: IDEAS 時(shí)間: 2025-3-23 12:07 作者: Melanoma 時(shí)間: 2025-3-23 13:55
Frühmittelhochdeutsche Literaturanalysis for a recently proposed window control algorithm of the M-ary form are discussed. One such implication is that, the systemic stability of a partially distributed implementation of the window controller is guaranteed stable.作者: 一個(gè)攪動(dòng)不安 時(shí)間: 2025-3-23 21:29 作者: 正論 時(shí)間: 2025-3-24 00:25 作者: maladorit 時(shí)間: 2025-3-24 02:21
HOAI 2009-Textausgabe/HOAI 2009-Text Editionemaphores and distributed barriers for synchronization of distributed processes. We evaluate our testbed using a set of applications taken from different fields including applications from the SPLASH (Stanford Parallel Applications for Shared Memory) suite. These experiments show close to linear speedup in many cases.作者: 撫慰 時(shí)間: 2025-3-24 08:31
Mobile Computing: A Research Perspectivechitecture point of view, a wireless network is another subnet attached to the backbone network. The key difference with respect to wired networks, however, lies in the mobility of hosts enabled by wireless access.作者: 開始發(fā)作 時(shí)間: 2025-3-24 14:41
Stability and Optimality of Continuous Time M-, Rate Control Mechanismsanalysis for a recently proposed window control algorithm of the M-ary form are discussed. One such implication is that, the systemic stability of a partially distributed implementation of the window controller is guaranteed stable.作者: 無(wú)目標(biāo) 時(shí)間: 2025-3-24 18:13 作者: shrill 時(shí)間: 2025-3-24 21:55
Single and Multiple Frame Video Traffic Prediction Using Neural Network Modelsraffic and an on-line learning method for complex one. Simulation studies of cell losses in an ATM multiplexer using recorded variable-bit-rate coded video teleconference data indicate reasonably good predictions for buffer delays between 0.5 and 5 ms.作者: 意外 時(shí)間: 2025-3-25 00:36
A DSM-based portable distributed programming testbedemaphores and distributed barriers for synchronization of distributed processes. We evaluate our testbed using a set of applications taken from different fields including applications from the SPLASH (Stanford Parallel Applications for Shared Memory) suite. These experiments show close to linear speedup in many cases.作者: 記成螞蟻 時(shí)間: 2025-3-25 07:13
Lecture Notes in Computer Scienceance of an implementation of a protocol to its standards. We will discuss these methods briefly. Finally, we will compare different test methodologies based on their fault coverage and the length of the test sequence.作者: obtuse 時(shí)間: 2025-3-25 08:22 作者: myocardium 時(shí)間: 2025-3-25 12:27 作者: 植物茂盛 時(shí)間: 2025-3-25 17:16 作者: BRINK 時(shí)間: 2025-3-25 23:34
X.500 Performance with Large Databases and OSInete directory having a large amount of data distributed across the internet. The model is validated by comparing the results of these actual measurements with the predicted values. The application of the model for the selection of DIT structure in a wide area network is explained.作者: Crohns-disease 時(shí)間: 2025-3-26 04:12
Computer Networks, Architecture and Applications978-0-387-34887-2Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: Overstate 時(shí)間: 2025-3-26 05:00 作者: 背信 時(shí)間: 2025-3-26 10:22 作者: 悶熱 時(shí)間: 2025-3-26 13:29 作者: Deference 時(shí)間: 2025-3-26 17:20
Walther von der Vogelweide 51, 13: effectiveness of various bandwidth allocation mechanisms for this class of applications. First, we describe how a rate based hop by hop (HBH) congestion control scheme, proposed previously by us for controlling data traffic, may be modified to control the flow of image traffic. The performance of t作者: Anecdote 時(shí)間: 2025-3-26 22:52 作者: organic-matrix 時(shí)間: 2025-3-27 01:07
https://doi.org/10.1007/978-3-476-99725-8the movable boundary traffic integration scheme on each link. Numerical results obtained from the approximation are compared with simulation results. We analyse the discrepancies between the simulation and the approximation. The analysis reveals an important phenomenon that occurs when packets and c作者: 支架 時(shí)間: 2025-3-27 09:15
Eine Stiftungs Notiz für ein Deutsches Lieday is obtained that is equal to twice the propagation delay from the node to the most upstream node. The expected request bus access delay for Poisson offered traffic is the expected waiting time in a slotted ./1 non-preemptive priority queue, for which an expression is obtained. The upper bound on 作者: BUDGE 時(shí)間: 2025-3-27 11:17
Zur Typologie Mündlicher Sprachdenkm?lers a classroom, where interaction, in the form of text, graphic images and voice is two way. This paper presents some details of Vartalaap with a special reference to its support for multimedia based 2-way interaction between a “Presenter” and a “group of participants”. The Presenter and the particip作者: 裂縫 時(shí)間: 2025-3-27 16:51
Walther von der Vogelweide 51, 13: . structured channel to provide connectivity among user entities in an application through network nodes and links, and ii) user specifiable attributes of data flow through a channel, namely, . and .. The abstraction is useful for multi-service networks where applications have diverse transport requ作者: 范圍廣 時(shí)間: 2025-3-27 19:36 作者: exquisite 時(shí)間: 2025-3-28 02:00 作者: 葡萄糖 時(shí)間: 2025-3-28 05:44
Lecture Notes in Computer Scienceramework proposed by the International Standards Organization. Many efficient test sequence generation methods have been proposed to check the conformance of an implementation of a protocol to its standards. We will discuss these methods briefly. Finally, we will compare different test methodologies作者: ATP861 時(shí)間: 2025-3-28 09:13 作者: Rct393 時(shí)間: 2025-3-28 11:10
HOAI 2009-Textausgabe/HOAI 2009-Text EditionDSM) is an abstraction of shared memory on distributed computers having no physically shared memory. This paper presents the design and implementation of a completely user-level DSM system on top of Unix. Our testbed uses only System V shared memory IPC, Berkeley sockets and Unix’s signal handling f作者: 弓箭 時(shí)間: 2025-3-28 15:28 作者: 結(jié)構(gòu) 時(shí)間: 2025-3-28 21:56 作者: Immunization 時(shí)間: 2025-3-28 23:44 作者: 責(zé)怪 時(shí)間: 2025-3-29 04:52
Implementation of an IEEE 802.6 Compliant Card for the ISA BusThis paper describes an implementation of an IEEE 802.6 compliant, DQDB card for the PC-AT bus. We discuss the various issues involved in design of the card and describe the various functional blocks of the card in detail. We also discuss how a DQDB network can be used as a distributed multiplexer for an ATM link.作者: 怒目而視 時(shí)間: 2025-3-29 08:57
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/c/image/233670.jpg作者: 思想 時(shí)間: 2025-3-29 11:28
Conference proceedings 1995Computer Networks, Architecture and Applicationscovers manyaspects of research in modern communications networks for computingpurposes.作者: 假設(shè) 時(shí)間: 2025-3-29 17:42 作者: 情感脆弱 時(shí)間: 2025-3-29 21:33
978-1-4757-9804-3IFIP International Federation for Information Processing 1995作者: thyroid-hormone 時(shí)間: 2025-3-30 01:04
Mobile Computing: A Research Perspectiveting, popularly known as nomadic computing. Battery powered, untethered computers are likely to become a pervasive part of our computing infrastructure [9]. There are, however, many technical challenges involved before the vision of ubiquitous computing can be realized. Paramount among these is the 作者: 虛弱的神經(jīng) 時(shí)間: 2025-3-30 06:36 作者: 大洪水 時(shí)間: 2025-3-30 08:36 作者: Thyroiditis 時(shí)間: 2025-3-30 15:31 作者: 憤怒事實(shí) 時(shí)間: 2025-3-30 18:04
A Modified Distributed Queueing Access Protocol for Dual Unidirectional Bus Networksay is obtained that is equal to twice the propagation delay from the node to the most upstream node. The expected request bus access delay for Poisson offered traffic is the expected waiting time in a slotted ./1 non-preemptive priority queue, for which an expression is obtained. The upper bound on 作者: 發(fā)出眩目光芒 時(shí)間: 2025-3-30 23:26
Vartalaap: A Network Based Multimedia Presentation Systems a classroom, where interaction, in the form of text, graphic images and voice is two way. This paper presents some details of Vartalaap with a special reference to its support for multimedia based 2-way interaction between a “Presenter” and a “group of participants”. The Presenter and the particip作者: 小平面 時(shí)間: 2025-3-31 02:07
Communication Channels for Data Multicasting in Multi-service Networks. structured channel to provide connectivity among user entities in an application through network nodes and links, and ii) user specifiable attributes of data flow through a channel, namely, . and .. The abstraction is useful for multi-service networks where applications have diverse transport requ作者: 破裂 時(shí)間: 2025-3-31 08:34 作者: 漂浮 時(shí)間: 2025-3-31 10:19
Protocol Test Sequence Generation Using MUIOS Based on TSP Problemration problem using MUIOS is viewed as an asymmetric travelling sales person problem and is solved using . annealing methodology. This technique is applied to various test cases and the results are compared with the results obtained by using rural Chinese postman algorithm.作者: STEER 時(shí)間: 2025-3-31 15:59
Protocol Conformance Testing — A Surveyramework proposed by the International Standards Organization. Many efficient test sequence generation methods have been proposed to check the conformance of an implementation of a protocol to its standards. We will discuss these methods briefly. Finally, we will compare different test methodologies作者: 滑稽 時(shí)間: 2025-3-31 20:32 作者: 隱藏 時(shí)間: 2025-3-31 23:46
A DSM-based portable distributed programming testbedDSM) is an abstraction of shared memory on distributed computers having no physically shared memory. This paper presents the design and implementation of a completely user-level DSM system on top of Unix. Our testbed uses only System V shared memory IPC, Berkeley sockets and Unix’s signal handling f