Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
- Holidays and Film Premieres: A Symbolic Punctuation of Time - Mikhalkov’s "Predstoyaniye": The Film and the Word - Attendance and Reception of "Predstoyaniye" (17/22 April 2010) - "Tsitadel" (5 May 2011; originally planned for 4... more
    • by 
    •   13  
      IconographyLiturgyRussian Orthodox ChurchWorld War II
    • by 
    •   5  
      PoliticsIdeologyFictionIcon
ABSTRACTIcons are frequently used in contexts where comprehension needs to be consistent across cultural and linguistic barriers. This paper reports on a study comparing the comprehension of 54 universal medical icons in rural Tanzania... more
    • by 
    •   9  
      IconographyDesignGraphic DesignDesign Research
    • by 
    •   6  
      Art HistoryArtPaintingVisual Arts
Sculptures of Shiva Nataraja, dancing in his ring of flame, may be the best-known objects of Indic art. Their fame and their academic interpretation derive in large part, however, from an essay by Ananda K. Coomaraswamy that... more
    • by 
    •   4  
      ArtIconArt Theory and CriticismICON
Mythological representations have always symbolically embodied human beings' ancestral fears and wishes. Yet today the reading of the languages of new myths can convey the key to an understanding of the historical period we are living in.... more
    • by 
    •   7  
      ArtAutobiographyIconMichelle Obama
    • by 
    •   3  
      TourismIconICON
Ad hoc networks typically require a significant amount of routing and control information to be distributed in a timely and reliable manner throughout the network, particularly in dynamic environments. As traffic levels increase and the... more
    • by 
    •   9  
      Routing protocolsAd Hoc NetworksIconAd hoc network
In this paper, we overview the implementation of an algorithm to coordinate the congestion control algorithms of the TCP transport protocol and the ATM celloriented switching architecture. The novel idea uses ATM rate-based flow control... more
    • by 
    •   17  
      Agent BasedCongestion ControlPacket SwitchingSoftware Agents
    • by 
    •   6  
      Pattern RecognitionDistributed SystemSecurity ManagementIcon
The Character Sequence Modeling (CSM), typically called the Language Modeling, has not received sufficient attention in the current transliteration research. We discuss the impact of various CSM factors like word granularity, smoothing... more
    • by 
    •   3  
      IconLanguage ModelICON
Marking and Mark-based Detection to the field of IP Traceback. In Dynamic Marking it is possible to find the attack agents in a large scale DDoS network. Moreover, in the case of a DRDoS it enables the victim to trace the attack one step... more
    • by 
    •   10  
      Routing protocolsProbabilityIconICON
It is generally accepted that self-similar (or fractal) processes may provide better models of teletraffic in modern computer networks than Poisson processes. Thus, an important requirement for conducting simulation studies of... more
    • by  and +1
    •   9  
      Telecommunication NetworksComputer NetworkIconWavelet Transform
Close Document Image Close Document Printer Image Print This Document! Conservation Information Network (BCIN). Author: Romey, Kristin Title Article/Chapter: "Bourgeois dreams: Georgia's forgotten Art Nouveau legacy ...
    • by 
    •   2  
      IconICON
p-Cycle is a type of shared link protection for survivable wavelength-division multiplexing (WDM) mesh networks. p-Cycle not only retains ring-like restoration speeds, but also achieves capacity efficiency in mesh networks. However,... more
    • by 
    •   9  
      Computational ComplexityLinear ProgrammingInteger ProgrammingIcon
This paper introduces a novel approach to transport messages between a backbone network and a device network (SAN) in a seamless way, even when these networks use incompatible protocols or technologies. The paper shows how to leverage a... more
    • by 
    •   5  
      MiddlewareIconWireless SensorICON
Previous papers have described and evaluated the performance of packet discard techniques for maintaining packet integrity during overload in ATM switches but without taking into account di erent classes of service.
    • by 
    •   3  
      IconData Flow DiagramICON
In this paper, we overview the implementation of an algorithm to coordinate the congestion control algorithms of the TCP transport protocol and the ATM celloriented switching architecture. The novel idea uses ATM rate-based flow control... more
    • by 
    •   16  
      Congestion ControlPacket SwitchingSoftware AgentsIcon
Ad hoc networks typically require a significant amount of routing and control information to be distributed in a timely and reliable manner throughout the network, particularly in dynamic environments. As traffic levels increase and the... more
    • by  and +1
    •   6  
      IconAd hoc networkRouting ProtocolData Flow Diagram
We introduce a new paradigm for the retrieval and presentation of management data. XNAMI is a Javabased network and application management toolkit which uses XML and the Document Object Model to specify a Management Information Base (MIB)... more
    • by 
    •   2  
      IconICON
Abstrmct-In this paper we present an adaptive multiple antenna selection (AdMAS) employing a maximum of 4 transmit (4 Tx) and I receive (1 Rx) antenna in conjunction with coded spacetime-frequency (STF) orthogonal frequency division... more
    • by 
    •   6  
      Fading ChannelIconBroadband Wireless AccessCode Generation