... Accession Number : ADA077220. Title : Access-Control Disciplines for Multi-Access Communication Channels: Reservation and TDMA Schemes,. ...
DTIC Science & Technology
... Accession Number : AD0845767. Title : Page-Control Schemes in a Multiprocessor with Associative Control. Descriptive Note : Final technical ...
... Accession Number : ADA082393. Title : Access-Control Schemes for Real-Time and Store-and Forward Multiple-Access Communication Channels. ...
... Accession Number : ADA327920. Title : A Forward Error Control Scheme for GBS and BADD. Descriptive Note : Technical rept.,. ...
A shared secret scheme is normally specified in terms of a desired security, P(sub d), and a concurrence scheme, (Gamma). The concurrence scheme (aka access structure) identifies subsets of participants (also called trustees or shareholders) each of which...
National Technical Information Service (NTIS)
... user is not transmitting (half-duplex operation is ... static control schemes for achieving stability are described ... set of source-destination pairs, a true ...
... The novel traffic-adaptive Cooperative Wireless Sensor Network Medium Access Control (CWS-MAC) scheme is proposed and shown to provide ...
Dean of Students Information Sheet Jubilee - Mature Age Students 2006 The Jubilee Scheme was established in 1992 to mark the Silver Jubilee of Macquarie University. The Scheme provides a quota controlled or the BEd (Early Childhood) and study on campus. Jubilee is an access scheme but once you ...
E-print Network
to control the whole group and is responsible for group rekeying. In the decentralised approach, multiple access control depends on the group membership policy. A member can carrysomesecretinformation in a controlled flooding scheme to reconnect to the group if it has not heard the periodic ...
... Accession Number : AD0764901. Title : Adaptive Training of Manual Control: Relation of Adaptive Scheme Parameters to Task Parameters. ...
Under Integrated Random-Access Reservation (IRAR) access-control schemes, newly arrived packets can be designated for reserved or random-access transmissions. In the latter case, if a collision occurs, each colliding packet is assigned for transmission by...
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management ...
NASA Astrophysics Data System (ADS)
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on ...
... Accession Number : ADA201258. Title : Scheme86: An Architecture for Microcoding a Scheme Interpreter. Descriptive Note : Memorandum rept. ...
Modern scholarship increasingly relies on sophisticated computerized analyses of copyrighted works. Technological access control schemes that prevent novel computerized analyses of works prevent fair use and impede scholarship, and are therefore counter to the goals of copyright law.
... When implementing a carrier sense, multiple arbitration (CSMA) scheme, CAN nodes monitor and arbitrate access to the communications medium ...
Error control systems for multi access communication channels are investigated. Error detection and retransmission techniques, also referred to as automatic request repeat (ARQ) schemes, are integrated with basic channel access control disciplines. The channel access ...
In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can ...
PubMed
Abstract. User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms of data and resource access. A centralized ...
Use of automatic program restructuring and memory access combining for a general-purpose large-scale shared memory machine is investigated. Effects of unpredictable control flows and data accesses on the effectiveness of automatic program restructuring are considered through the experiments of several basic nonnumerical programs. ...
Energy Citations Database
... Accession Number : ADA062363. Title : The Revised Report on SCHEME: A Dialect of LISP. ... Abstract : SCHEME is a dialect of LISP. ...
scheme, their order is unimportant. In [1], Reed-Solomon error correction is used to account for possibly, this comes at the cost of some entropy loss. Also, Reed- Solomon error correction may be used to introduce scheme). 5 Implementation A prototype of the schemes discussed above has been implemented in Java
This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load ...
... Accession Number : AD0652825. Title : ANALYSIS OF COMMUNICATION SCHEMES USING AN INTERMITTENT FEEDBACK LINK. ...
... Accession Number : ADD437918. Title : A Differential Scheme for Multiphase Composites,. Corporate Author : Personal ...
... Title : Performance Evaluation of Channel Access Schemes in Multihop Packet Radio Networks with Regular Structure by Simulation. ...
... Accession Number : ADA046353. Title : Integrated Random-Access Reservation Schemes for Multi-Access Communication Channels,. ...
CRMA-II (Cyclic Reservation Multiple Access, Version II) is a media access control protocol for local and metropolitan area networks working in the Gbit/s range. The access scheme is based on direct access to a slotted medium combined with a reservation ...