• Aucun résultat trouvé

link state protocol

Multipath Optimized Link State Routing for Mobile ad hoc Networks

Multipath Optimized Link State Routing for Mobile ad hoc Networks

... Through topology sensing, each node in the network can get su fficient information of the topology to enable routing. The link state protocol tries to keep the link information of the whole ...

17

Multipath Optimized Link State Routing for Mobile ad hoc Networks

Multipath Optimized Link State Routing for Mobile ad hoc Networks

... Through topology sensing, each node in the network can get su fficient information of the topology to enable routing. The link state protocol tries to keep the link information of the whole ...

17

Multipath Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2)

Multipath Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2)

... Optimized Link State Routing Protocol version 2 (OLSRv2) [RFC7181] is a proactive link state protocol designed for use in Mobile Ad Hoc Networks ...

29

Optimized Link State Routing Protocol (OLSR)

Optimized Link State Routing Protocol (OLSR)

... OLSR protocol has a natural control over the ow of its control ...the link qualities for short times by causing numerous collisions on those links, possibly provoking route repair ...the protocol ...

57

From link grammars to categorial grammars.

From link grammars to categorial grammars.

... Key words: Link grammars, classsical categorial grammars, English lexicon, efficient parsing. 1 Introduction Categorial grammars include various formalisms intended to represent lan- guages. These systems ...

16

Partial Learning Using Link Grammars Data

Partial Learning Using Link Grammars Data

... 4.3 Problems and Future Work Although the partial learning part seems to work quite well, we do not have yet “real” learning results to present in this paper. Actually, several problems make hard the adaptation of ...

13

Secure Time Synchronization Protocol

Secure Time Synchronization Protocol

... The protocol needs to consider many types of attacks. In the Man in the Middle (MITM) attack, the attacker can intercept packets, change and relay them to their respective destinations to alter the protocol ...

7

Scaling Out Link Prediction with SNAPLE

Scaling Out Link Prediction with SNAPLE

... the Gather Apply Scatter (GAS) model. The resulting system, called Snaple, relies on a scoring framework of potential edges that eschews large data flows along graph edges. Instead, Snaple combines and aggregates ...

13

Testing unilateral and bilateral link formation

Testing unilateral and bilateral link formation

... responses as due to measurement error and that the data describe, albeit with some error, actual links between villagers. 6 The process by which links between villagers are formed can be bilateral or unilateral. Much of ...

39

Several link keys are better than one, or extracting disjunctions of link key candidates

Several link keys are better than one, or extracting disjunctions of link key candidates

... Abstract Link keys express conditions under which instances of two classes of different RDF data sets may be considered as ...extract link key candidates from RDF data sets and different measures have been ...

21

Cold Start Link Prediction

Cold Start Link Prediction

... apply link prediction to a social net- work of ...apply link prediction to biology and physics using hierarchi- cal models in order to detect links that have not been observed during ...initial link ...

13

Virtual Trials of the NICE-SUGAR Protocol: The Impact on Performance of Protocol and Protocol Compliance

Virtual Trials of the NICE-SUGAR Protocol: The Impact on Performance of Protocol and Protocol Compliance

... therapy protocol (NS- IIT) targeted a glycaemic range of ...approach protocol can be found in (Finfer et ...reported protocol, and nutrition increased in simulation daily to reflect reported ...

6

Controlled electromigration protocol revised

Controlled electromigration protocol revised

... of EM-based fabrication can be achieved by a successful revision of the EM protocol, instead of hardware redesign. An algorithm is proposed, which is particularly sensitive when the internal positive feedback of ...

8

Link stream graph for temporal recommendations

Link stream graph for temporal recommendations

... Data are modeled as link stream {(t, u, i)} and the interpretation of any triplet depends on the domain. In the case of on-line shopping, each triplet means that the customer u has bought item i at time t. In ...

9

An improved resource reservation protocol

An improved resource reservation protocol

... receiver-oriented protocol, the PATH message works as in RSVP but collects information for both directions and the RESV message is used to reserve the ...receiver-oriented protocol by utilizing the RESV to ...

9

Towards a versatile transport protocol

Towards a versatile transport protocol

... transport protocol able to take into account the under- lying configuration of the network and the nature of the ...new protocol that makes it possible to compose TFRC [4] and SACK [6] mech- ...This ...

2

The LETUCA protocol, Operational manual

The LETUCA protocol, Operational manual

... LETUCA protocol The LETUCA protocol and its twelve exercises were designed and used within the framework of the PhD of L’Haridon ...LETUCA protocol enabled to measure the evolution of the performance ...

199

Misbehavior Reporting Protocol for C-ITS

Misbehavior Reporting Protocol for C-ITS

... system, an ITS entity should refrain from reporting a misbe- having station that is continuously misbehaving. Instead, the station should send an initial report then wait whilst collecting evidences. After a certain ...

5

A Lightweight IoT Security Protocol

A Lightweight IoT Security Protocol

... Authors in [13] propose a security protocol called HIP (Host Identity Protocol). Their study focuses mainly on the security of the constrained devices over LoWPAN (Low power Wire- less Personal Area ...

9

Design and validation of a reliable rate based transport protocol: the chameleon protocol

Design and validation of a reliable rate based transport protocol: the chameleon protocol

... this protocol: ...new protocol in the following Section II we demonstrate that the present composition of SACK and TFRC does not impact on the TFRC TCP-friendliness property and validate the add- on of SACK ...

9

Show all 3152 documents...

Sujets connexes