派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computer and Information Sciences - ISCIS 2005; 20th International S pInar Yolum,Tunga Güng?r,Can ?zturan Conference proceedings 2005 Sprin [打印本頁(yè)]

作者: 解放    時(shí)間: 2025-3-21 19:35
書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005影響因子(影響力)




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005被引頻次




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005被引頻次學(xué)科排名




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005年度引用




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005年度引用學(xué)科排名




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005讀者反饋




書(shū)目名稱(chēng)Computer and Information Sciences - ISCIS 2005讀者反饋學(xué)科排名





作者: 單獨(dú)    時(shí)間: 2025-3-21 23:07

作者: Narcissist    時(shí)間: 2025-3-22 00:59

作者: GUMP    時(shí)間: 2025-3-22 05:32

作者: Apogee    時(shí)間: 2025-3-22 10:26
Sudden Death and the End of Life,proving the utilization of radio resources; (.) it reduces the mean file transfer time for ftp applications with respect to a classical allocation scheme. This paper has been carried out within A&TCP research group of the “SatNEx” NoE project (URL: www.satnex.org; contract No. 507052) belonging to t
作者: IVORY    時(shí)間: 2025-3-22 16:22
Erich H. Loewy,Roberta Springer Loewy first present a brief background on adaptive resource allocation and management (ARAM) system developed in our earlier work [1]. Then, we provide the proof of concept ex-periments for the newly introduced aggressive back off strategy. We show that the distributed control provided by the watermarks
作者: IVORY    時(shí)間: 2025-3-22 18:44
Keeping Viruses Under Controlesigned to deal with the virus’ ability to mutate. In particular, the analysis shows that the concentration of anti-viral agent by itself does not suffice to ultimately control the infection, and that it is important to dose a mix of anti-viral agents so as to target each strain of virus in a specif
作者: Multiple    時(shí)間: 2025-3-22 22:37

作者: ALIAS    時(shí)間: 2025-3-23 04:07

作者: 鞏固    時(shí)間: 2025-3-23 06:14
IP Traffic Load Distribution in NGEO Broadband Satellite Networks – (Invited Paper)h high traffic load sends signals to its neighboring satellites requesting them to decrease their sending rates before it gets congested and packets are ultimately dropped. Neighboring satellites should accordingly respond and search for other alternate paths that do not include the satellite in que
作者: interpose    時(shí)間: 2025-3-23 10:35
Cross-Layer Management of Radio Resources in an Interactive DVB-RCS-Based Satellite Network—(Invitedproving the utilization of radio resources; (.) it reduces the mean file transfer time for ftp applications with respect to a classical allocation scheme. This paper has been carried out within A&TCP research group of the “SatNEx” NoE project (URL: www.satnex.org; contract No. 507052) belonging to t
作者: defendant    時(shí)間: 2025-3-23 17:43

作者: ARENA    時(shí)間: 2025-3-23 18:49

作者: Enthralling    時(shí)間: 2025-3-24 00:57

作者: appall    時(shí)間: 2025-3-24 03:20

作者: 我們的面粉    時(shí)間: 2025-3-24 09:17

作者: 合唱團(tuán)    時(shí)間: 2025-3-24 13:08

作者: AWRY    時(shí)間: 2025-3-24 16:59
,“,”: The Haunting Qualities of Ravensbrück,tability of the main multicast delivery tree. The simulation results show that FHMM is effective with low packet loss rate, high multicast packet delivery efficiency and little multicast maintenance overhead.
作者: 占卜者    時(shí)間: 2025-3-24 20:29

作者: neurologist    時(shí)間: 2025-3-24 23:45
Sudden Death and the End of Life,selection algorithm. Our algorithm not only attempts to make the trajectory straight but also considers the nodal density of recipient nodes and the seamless grid-by-grid multicast. Simulation results turns out that our algorithm dissipates significantly less power, compared to the non grid-based method, as greedy forwarding.
作者: hyperuricemia    時(shí)間: 2025-3-25 03:19
An Agent-Based Scheme for Efficient Multicast Application in Mobile Networkstability of the main multicast delivery tree. The simulation results show that FHMM is effective with low packet loss rate, high multicast packet delivery efficiency and little multicast maintenance overhead.
作者: FRAX-tool    時(shí)間: 2025-3-25 09:12
An Efficient On-line Job Admission Control Scheme to Guarantee Deadlines for QoS-Demanding Applicatigorithm of .(.) complexity, which in practice incurs sufficiently low overhead. Our experimental results show that the proposed admission control scheme outperforms existing approaches with respect to achievable processor utilization.
作者: 流利圓滑    時(shí)間: 2025-3-25 14:12

作者: Instrumental    時(shí)間: 2025-3-25 16:17
SCTP Based Framework for Mobile Web Agent. Mean response time is an important performance measure of web agents. Our simulation results show that our SCTP based framework reduces the mean response time of a typical transmission control protocol (TCP) based framework remarkably.
作者: Dysplasia    時(shí)間: 2025-3-25 23:33
Comparison of Hyper-DAG Based Task Mapping and Scheduling Heuristics for Wireless Sensor Networksms is to minimize schedule lengths subject to energy consumption constraints. Simulation results show that the CNPT-based HDMS algorithm outperforms other heuristic algorithms with respect to schedule lengths and heuristic execution times subject to energy consumption constraints.
作者: 龍卷風(fēng)    時(shí)間: 2025-3-26 02:33

作者: Eclampsia    時(shí)間: 2025-3-26 07:45
Automatic Translation of Serial to Distributed Code Using CORBA Event Channelsc conversion of ordinary method calls into asynchronous inter-cluster calls has been achieved by developing a new simple data dependency analysis algorithm. The layered architecture of our suggested environment has provided a general pattern to create distributed code which can be easily implemented within different infrastructures.
作者: Coronary-Spasm    時(shí)間: 2025-3-26 12:18
Fault Tolerant and Robust Mutual Exclusion Protocol for Synchronous Distributed Systemsented as a detailed simulation model in terms of a class of the extended Petri nets. The results of the simulation study of a distributed system with the proposed protocol of mutual exclusion, for different numbers of processes in the group and different loads, are discussed.
作者: 新義    時(shí)間: 2025-3-26 14:24
https://doi.org/10.1007/978-1-4614-1287-8ion problem is NP-complete. The objective function is function of lost flow due to a failure of any single link. To our knowledge this problem have not received much attention in the literature. We provide also a numerical example to illustrate the proposed approach.
作者: initiate    時(shí)間: 2025-3-26 17:26
https://doi.org/10.1057/978-1-137-59445-7rs instead of keys of larger bits. So, any computation on these keys is carried out in parallel using remainders. Thus this approach reduces overall computational overhead. This algorithm reduces communication over head during the join event highly without compromising security.
作者: refraction    時(shí)間: 2025-3-27 00:52
Sudden Death and the End of Life,. We present fast VPN backup path construction algorithms which can dynamically make the MPLS VPN service to be available with minimal disruption, satisfying the resilience requirement from the customers. The simulation has been done to evaluate the performance of the approach.
作者: ALIAS    時(shí)間: 2025-3-27 01:45
Erich H. Loewy,Roberta Springer Loewy.’s scheme is inefficient regarding subscription channel protection. As a result, we propose an improved scheme to reduce this inefficiency by applying a two-level key hierarchy method for a resource limited device, such as the DMB service in mobile phones.
作者: 他很靈活    時(shí)間: 2025-3-27 05:54
A Unified Approach to Survivability of Connection-Oriented Networksion problem is NP-complete. The objective function is function of lost flow due to a failure of any single link. To our knowledge this problem have not received much attention in the literature. We provide also a numerical example to illustrate the proposed approach.
作者: Palpitation    時(shí)間: 2025-3-27 12:41
An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theoremrs instead of keys of larger bits. So, any computation on these keys is carried out in parallel using remainders. Thus this approach reduces overall computational overhead. This algorithm reduces communication over head during the join event highly without compromising security.
作者: euphoria    時(shí)間: 2025-3-27 14:11
A Methodology of Resilient MPLS/VPN Path Management Under Multiple Link Failures. We present fast VPN backup path construction algorithms which can dynamically make the MPLS VPN service to be available with minimal disruption, satisfying the resilience requirement from the customers. The simulation has been done to evaluate the performance of the approach.
作者: 努力趕上    時(shí)間: 2025-3-27 21:14

作者: 子女    時(shí)間: 2025-3-27 23:51
The Ethics of Territorial Bordersew protocol procedure, Hold State, is developed to address the link outages due to persistent fades. The simulation results show that TCP-Peach++ improves the throughput performance during rain fades and addresses the bandwidth asymmetry problems in Satellite IP Networks.
作者: WITH    時(shí)間: 2025-3-28 05:09
TCP-Peach++: Enhancement of TCP-Peach+ for Satellite IP Networks with Asymmetrical Bandwidth and Perew protocol procedure, Hold State, is developed to address the link outages due to persistent fades. The simulation results show that TCP-Peach++ improves the throughput performance during rain fades and addresses the bandwidth asymmetry problems in Satellite IP Networks.
作者: Bother    時(shí)間: 2025-3-28 08:06

作者: Commemorate    時(shí)間: 2025-3-28 10:29

作者: 可卡    時(shí)間: 2025-3-28 17:55

作者: arcane    時(shí)間: 2025-3-28 22:19

作者: 引導(dǎo)    時(shí)間: 2025-3-29 00:39
0302-9743 Overview: 978-3-540-29414-6978-3-540-32085-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 侵略主義    時(shí)間: 2025-3-29 05:54

作者: 托人看管    時(shí)間: 2025-3-29 11:00
Robert W. McGee,Sheldon R. Smithopportunities for maximizing gains, as long as they carefully select appropriate mechanisms for the market of interest. Studies in recent years have provided auctioneers with additional, improved mechanisms and strategies for maximizing profits. In this respect, on-line auctioneers utilize the state
作者: CHOIR    時(shí)間: 2025-3-29 13:17

作者: 能得到    時(shí)間: 2025-3-29 18:48

作者: 單調(diào)性    時(shí)間: 2025-3-29 22:16
,“,”: The Haunting Qualities of Ravensbrück,brings attractive applications, but also has the benefit of saving scarce bandwidth in wireless environment. In order to achieve efficient multicast in mobile networks, we propose an agent-based scheme called Mobile Multicast with Fast Handoff and Hierarchical Architecture (FHMM). This scheme introd
作者: Monocle    時(shí)間: 2025-3-30 01:12
https://doi.org/10.1057/978-1-137-59445-7arge dynamic group. All group rekeying protocols add communication as well as computational overhead at the Group Key Controller (GKC) and group members. The trade off between these overheads depends on different levels of security required for different types of multicast applications [10,12,16]. T
作者: 赦免    時(shí)間: 2025-3-30 07:47

作者: 拔出    時(shí)間: 2025-3-30 11:20
https://doi.org/10.1007/0-306-46836-0ieve near optimal performance with practical utility. The proposed admission control scheme is based on a novel schedulability measure for a deadline-constrained task, called ., which can be viewed as a combination of the processor time demand and the utilization factor. We first show that this new
作者: irreducible    時(shí)間: 2025-3-30 12:34

作者: MEN    時(shí)間: 2025-3-30 19:05

作者: 披肩    時(shí)間: 2025-3-30 21:47
https://doi.org/10.1007/0-306-46836-0lity and memory, and operate with limited battery power. Nodes go out of service when their batteries run out of energy, and the whole network moves to a global out-of-service state. The target of this paper is to define an analytical framework to evaluate the transient behavior of a sensor network
作者: pancreas    時(shí)間: 2025-3-31 01:09
Sudden Death and the End of Life,on, even though two trajectories intersect geometrically. It can result in considerable time delay and in the worst, looping in the trajectory or query flooding the network causing inefficient power consumption and bandwidth utilization because it follows by resubmission of the query or initiation o
作者: 莎草    時(shí)間: 2025-3-31 07:00
Erich H. Loewy,Roberta Springer Loewytribution scheme is proposed in Huang et al.’s paper. They use an exclusive-OR operation and a one-way hash function for key distribution in order to reduce the computational cost. One of the key distribution schemes for subscription channel protection, the group oriented key distribution scheme, ho
作者: Contracture    時(shí)間: 2025-3-31 12:50
https://doi.org/10.1007/0-306-46836-0ve global coverage. Since most of the world population lives around the equator or in middle-latitude regions, satellite constellations have to deal with different communication requirements from different regions. The traffic requirements become further unbalanced as the population density varies a
作者: 沒(méi)有準(zhǔn)備    時(shí)間: 2025-3-31 14:16

作者: 刺激    時(shí)間: 2025-3-31 21:10
Erich H. Loewy,Roberta Springer Loewy Return Channel Systems (DBS-RCS). The satellite architecture considered in this work is based on an asymmetric architecture with the high capacity forward link provided by the DBS and low speed return channel is provided by a constellation of Low Earth Orbiting (LEO) satellites. The network carries
作者: 難管    時(shí)間: 2025-3-31 22:58
The Ethics of Territorial Bordersmetrical bandwidth and persistent fades. The delayed SACK scheme is adopted to address the problems due to bandwidth asymmetrical satellite links. A new protocol procedure, Hold State, is developed to address the link outages due to persistent fades. The simulation results show that TCP-Peach++ impr
作者: 黑豹    時(shí)間: 2025-4-1 02:52

作者: Airtight    時(shí)間: 2025-4-1 08:31
https://doi.org/10.1007/978-3-030-02068-2based on reliable multicast communication in a network of processes. A brief description of the protocol is given. Guidelines for choice of time-outs and delays are presented, and complexity issues of the protocol are outlined along with a sensitivity analysis for robustness. The protocol was implem
作者: 愛(ài)花花兒憤怒    時(shí)間: 2025-4-1 11:52





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
和平县| 泽州县| 达日县| 宁国市| 临夏县| 永济市| 乡宁县| 茌平县| 离岛区| 洛川县| 濮阳县| 中卫市| 罗平县| 屏东县| 广汉市| 汤阴县| 临邑县| 肇庆市| 砀山县| 洮南市| 隆德县| 桑植县| 彰武县| 轮台县| 赣榆县| 武夷山市| 大城县| 中山市| 睢宁县| 绿春县| 达拉特旗| 和政县| 静海县| 连江县| 凤翔县| 榆林市| 晴隆县| 卢龙县| 屏东市| 施甸县| 惠州市|