Main View
This view is used for searching all possible sources.
First Page Previous Page 1 2 Next Page Last Page
 
1
Access-Control Disciplines for Multi-Access Communication ...
1977-01-05

... Accession Number : ADA077220. Title : Access-Control Disciplines for Multi-Access Communication Channels: Reservation and TDMA Schemes,. ...

DTIC Science & Technology

2
Page-Control Schemes in a Multiprocessor with Associative ...
1968-11-01

... Accession Number : AD0845767. Title : Page-Control Schemes in a Multiprocessor with Associative Control. Descriptive Note : Final technical ...

DTIC Science & Technology

3
Access-Control Schemes for Real-Time and Store-and ...
1980-01-01

... Accession Number : ADA082393. Title : Access-Control Schemes for Real-Time and Store-and Forward Multiple-Access Communication Channels. ...

DTIC Science & Technology

4
A Forward Error Control Scheme for GBS and BADD.
1997-07-22

... Accession Number : ADA327920. Title : A Forward Error Control Scheme for GBS and BADD. Descriptive Note : Technical rept.,. ...

DTIC Science & Technology

5
Geometric shared secret and/or shared control schemes.
1990-01-01

A shared secret scheme is normally specified in terms of a desired security, P(sub d), and a concurrence scheme, (Gamma). The concurrence scheme (aka access structure) identifies subsets of participants (also called trustees or shareholders) each of which...

National Technical Information Service (NTIS)

6
Spread Spectrum Random Access Schemes
1990-12-17

... user is not transmitting (half-duplex operation is ... static control schemes for achieving stability are described ... set of source-destination pairs, a true ...

DTIC Science & Technology

7
Traffic-Adaptive, Flow-Specific Medium Access for Wireless ...
2009-09-01

... The novel traffic-adaptive Cooperative Wireless Sensor Network Medium Access Control (CWS-MAC) scheme is proposed and shown to provide ...

DTIC Science & Technology

8
Dean of Students Information Sheet

Dean of Students Information Sheet Jubilee - Mature Age Students 2006 The Jubilee Scheme was established in 1992 to mark the Silver Jubilee of Macquarie University. The Scheme provides a quota controlled or the BEd (Early Childhood) and study on campus. Jubilee is an access scheme but once you ...

E-print Network

9
Int. J. Security and Networks, Vol. An efficient group key management scheme for

to control the whole group and is responsible for group rekeying. In the decentralised approach, multiple access control depends on the group membership policy. A member can carrysomesecretinformation in a controlled flooding scheme to reconnect to the group if it has not heard the periodic ...

E-print Network

10
Adaptive Training of Manual Control: Relation of Adaptive ...
1973-07-01

... Accession Number : AD0764901. Title : Adaptive Training of Manual Control: Relation of Adaptive Scheme Parameters to Task Parameters. ...

DTIC Science & Technology

11
Integrated Random-Access Reservation Schemes for Multi-Access Communication Channels.
1977-01-01

Under Integrated Random-Access Reservation (IRAR) access-control schemes, newly arrived packets can be designated for reserved or random-access transmissions. In the latter case, if a collision occurs, each colliding packet is assigned for transmission by...

National Technical Information Service (NTIS)

12
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
2009-01-01

A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management ...

NASA Astrophysics Data System (ADS)

13
Access and accounting schemes of wireless broadband
2004-04-01

In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on ...

NASA Astrophysics Data System (ADS)

14
Scheme86: An Architecture for Microcoding a Scheme ...
1988-08-01

... Accession Number : ADA201258. Title : Scheme86: An Architecture for Microcoding a Scheme Interpreter. Descriptive Note : Memorandum rept. ...

DTIC Science & Technology

15
Technological Access Control Interferes with Noninfringing Scholarship
2000-01-01

Modern scholarship increasingly relies on sophisticated computerized analyses of copyrighted works. Technological access control schemes that prevent novel computerized analyses of works prevent fair use and impede scholarship, and are therefore counter to the goals of copyright law.

E-print Network

16
Jet Engine Control Using Ethernet with a BRAIN (Postprint)
2008-07-01

... When implementing a carrier sense, multiple arbitration (CSMA) scheme, CAN nodes monitor and arbitrate access to the communications medium ...

DTIC Science & Technology

17
Error control systems for multi-access communication channels
1979-06-01

Error control systems for multi access communication channels are investigated. Error detection and retransmission techniques, also referred to as automatic request repeat (ARQ) schemes, are integrated with basic channel access control disciplines. The channel access ...

NASA Astrophysics Data System (ADS)

18
A Design of Tamper Resistant Prescription RFID Access Control System.
2011-07-13

In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can ...

PubMed

19
Distributed User Access Control in Sensor Networks
2006-01-01

Abstract. User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms of data and resource access. A centralized ...

E-print Network

20
Some issues in general-purpose shared memory multiprocessing: parallelism exploitation and memory access combining
1986-01-01

Use of automatic program restructuring and memory access combining for a general-purpose large-scale shared memory machine is investigated. Effects of unpredictable control flows and data accesses on the effectiveness of automatic program restructuring are considered through the experiments of several basic nonnumerical programs. ...

Energy Citations Database

First Page Previous Page 1 2 Next Page Last Page
 
First Page Previous Page 1 2 Next Page Last Page
 
21
The Revised Report on SCHEME: A Dialect of LISP.
1978-01-01

... Accession Number : ADA062363. Title : The Revised Report on SCHEME: A Dialect of LISP. ... Abstract : SCHEME is a dialect of LISP. ...

DTIC Science & Technology

22
Data is key: introducing the data-based access control paradigm

scheme, their order is unimportant. In [1], Reed-Solomon error correction is used to account for possibly, this comes at the cost of some entropy loss. Also, Reed- Solomon error correction may be used to introduce scheme). 5 Implementation A prototype of the schemes discussed above has been implemented in Java

E-print Network

23
Proposal of Wireless Traffic Control Schemes for Wireless LANs
2010-01-01

This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load ...

NASA Astrophysics Data System (ADS)

24
ANALYSIS OF COMMUNICATION SCHEMES USING AN ...
1967-03-01

... Accession Number : AD0652825. Title : ANALYSIS OF COMMUNICATION SCHEMES USING AN INTERMITTENT FEEDBACK LINK. ...

DTIC Science & Technology

25
A Differential Scheme for Multiphase Composites,
1981-12-29

... Accession Number : ADD437918. Title : A Differential Scheme for Multiphase Composites,. Corporate Author : Personal ...

DTIC Science & Technology

26
Performance Evaluation of Channel Access Schemes in ...
1985-06-01

... Title : Performance Evaluation of Channel Access Schemes in Multihop Packet Radio Networks with Regular Structure by Simulation. ...

DTIC Science & Technology

27
Integrated Random-Access Reservation Schemes for Multi ...
1977-07-01

... Accession Number : ADA046353. Title : Integrated Random-Access Reservation Schemes for Multi-Access Communication Channels,. ...

DTIC Science & Technology

28
Performance analysis of CRMA-II for GBIT/S-LANS
1993-10-01

CRMA-II (Cyclic Reservation Multiple Access, Version II) is a media access control protocol for local and metropolitan area networks working in the Gbit/s range. The access scheme is based on direct access to a slotted medium combined with a reservation ...

NASA Astrophysics Data System (ADS)

First Page Previous Page 1 2 Next Page Last Page