• Aucun résultat trouvé

[PDF] Top 20 Admission control and routing : theory and practice

Has 10000 "Admission control and routing : theory and practice" found on our website. Below are the top 20 most common "Admission control and routing : theory and practice".

Admission control and routing : theory and practice

Admission control and routing : theory and practice

... Keywords: ATM, Virtual Circuit Networks, BISDN, Multimedia Networks, Interconnection Networks for Massively Parallel Computers, Multicast Communication, Broadcast Communi[r] ... Voir le document complet

190

Typechecking in the lambda-Pi-Calculus Modulo : Theory and Practice

Typechecking in the lambda-Pi-Calculus Modulo : Theory and Practice

... precise control over the notion of ...values) and rewrite rules (the reason for the Modulo ...[Boe11] and then by Carbonneaux ...parsed and a dedicated type-checker was generated; second the ... Voir le document complet

169

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice

... unlinkability and anonymity prop- erties for a number of other protocols: Abadi and Fournet’s anonymous authentication pro- tocol [AF04], the AKA protocol deployed in 3G telephony networks [AMR + 12], the ... Voir le document complet

92

Social relations and knowledge management theory and practice

Social relations and knowledge management theory and practice

... management and its range, particularly in control over human beings and in the organizational capacities and reach of ...economy, and cannot be magically checked by the virtues of ...of ... Voir le document complet

1

The Patient's View: Issues of Theory and Practice

The Patient's View: Issues of Theory and Practice

... the admission process were hard to get through because they conflicted with his conception of personal independence, an independence he particularly wanted to prove to care ...the admission process was ... Voir le document complet

22

DiffServ-Aware Flow Admission Control and Resource Allocation Modeling

DiffServ-Aware Flow Admission Control and Resource Allocation Modeling

... links and thus helps operators to forecast network evolutions or anticipate future SLA ...AF and BE classes of service with a minimum guaranteed service for AF without penalizing BE and a maximum ... Voir le document complet

9

View of Theory and Practice: Examining PHAC's STI Assessment Guidelines Using Sexual Script Theory

View of Theory and Practice: Examining PHAC's STI Assessment Guidelines Using Sexual Script Theory

... occur, and be recognized, to produce a communal interpretation that a given event has the potential to become ...sexual and desirable: that is, in a given situation, everyone’s interpretation must ... Voir le document complet

13

Object-Oriented Metrics: A Review of Theory and Practice

Object-Oriented Metrics: A Review of Theory and Practice

... Design and Programming Guidelines An appealing operational approach for constructing design and programming guidelines using software product metrics is to make an analogy with conventional statistical ... Voir le document complet

33

The application of optimal control theory to dynamic routing in data communication networks.

The application of optimal control theory to dynamic routing in data communication networks.

... We may now compactly express the linear optimal control problem with linear state and control variable inequality constraints which represents the data communication network d[r] ... Voir le document complet

307

Provenance and Probabilities in Relational Databases: From Theory to Practice

Provenance and Probabilities in Relational Databases: From Theory to Practice

... [40] and real- world [38] data, for specific kinds of ...heuristics, and tools have emerged from the knowledge compilation ...[41], and d4 [35] compile arbitrary formulas in ... Voir le document complet

12

Convex Lifting: Theory and Control Applications

Convex Lifting: Theory and Control Applications

... lifting and to construct it for a given partition are ...necessary and sufficient condition for the existence of a convex ...examples and complexity analysis show promising results of the proposed ... Voir le document complet

17

KBAC: Knowledge-Based Admission Control

KBAC: Knowledge-Based Admission Control

... source and the destination, the rate of the flow requesting admission summed to the actual Equivalent Capacity keeps below the nominal link ...model and an aggregate arrival rate that follows a ... Voir le document complet

9

A City-Campus Engagement Theory From, and For, Practice

A City-Campus Engagement Theory From, and For, Practice

... recognizes and rewards faculty professional service and gives students substantial latitude in shaping their own intellectual ...Service and Civic Participation. These and other forms of ... Voir le document complet

15

KBAC: Knowledge-Based Admission Control

KBAC: Knowledge-Based Admission Control

... source and the destination, the rate of the flow requesting admission summed to the actual Equivalent Capacity keeps below the nominal link ...model and an aggregate arrival rate that follows a ... Voir le document complet

25

Random Matrix Theory for AI: From Theory to Practice

Random Matrix Theory for AI: From Theory to Practice

... Matrix Theory for AI: From Theory to Practice Keywords: Machine learning, random matrix theory, concentration of measure, neural net- works, GANs Abstract: AI nowadays relies largely on us- ... Voir le document complet

196

Jitter characterization in admission control and pricing issues in integrated multiservice networks

Jitter characterization in admission control and pricing issues in integrated multiservice networks

... bound and the improvement is more noticeable when N ...software and also the determination of the extremum value of t [22] ...big) and the accuracy of the results obtained (which directly depends on ... Voir le document complet

16

Admission Control in Stochastic Event Graphs

Admission Control in Stochastic Event Graphs

... Unité de recherche INRIA Lorraine, Technopôle de Nancy-Brabois, Campus scientifique, 615 rue du Jardin Botanique, BP 101, 54600 VILLERS LÈS NANCY Unité de recherche INRIA Rennes, Irisa, [r] ... Voir le document complet

37

Poverty, Inequality and Stochastic Dominance, Theory and Practice: Illustration with Burkina Faso Surveys

Poverty, Inequality and Stochastic Dominance, Theory and Practice: Illustration with Burkina Faso Surveys

... researchers and policy ...Methods and findings of this paper are illustrated with the Burk- ina Faso household surveys for the years 1994 and ... Voir le document complet

23

Antitakeover defensive tactics : theory, practice, and the effects on stockholder wealth

Antitakeover defensive tactics : theory, practice, and the effects on stockholder wealth

... If antitakeover charter provisions function in this manner, then target stockholders are less likely to bear the (real) costs of the incumbent managers' defensive fight[r] ... Voir le document complet

220

Feature extraction and supervised learning on fMRI : from practice to theory

Feature extraction and supervised learning on fMRI : from practice to theory

... together and for being always enthusiastic about new ...Chauffert and Matthieu ...Chagas and Ramón ...programming and machine learn- ing: Andreas Mueller, Vlad Niculae, Lars Buitinck, Mathieu ... Voir le document complet

134

Show all 10000 documents...