• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
39_Ashwani Kush.pmd
39_Ashwani Kush.pmd

... although the presence of one can certainly be utilized. Also, users need not have personal, direct experience with every other user in the network in order to compute an opinion about them. They can base their opinion on second hand evidence provided by intermediate nodes, thus benefiting from other ...
Support in setting up a non-grid Atlas Tier 3 - Indico
Support in setting up a non-grid Atlas Tier 3 - Indico

IOSR Journal of Computer Engineering (IOSRJCE)
IOSR Journal of Computer Engineering (IOSRJCE)

Shortest Paths in Networks
Shortest Paths in Networks

... H. Bast et al perform Dijkstra searches from a random sample of source stations and choose as hubs stations those that are on the the largest number of shortest paths. They report a time of 10ms for station-to-station query for a North America public transportation network consisting of 338K station ...
sensor data
sensor data

... only a random walk … can something better be done.  The tuning of parameters for different network sizes and different node densities is not clear. ...
Networked Environments: Grid and P2P systems
Networked Environments: Grid and P2P systems

COMPARATIVE STUDY OF TABLE DRIVEN ROUTING Mr. Pradip A. Chougule
COMPARATIVE STUDY OF TABLE DRIVEN ROUTING Mr. Pradip A. Chougule

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

... from several disadvantages. The next routing algorithm defined was URSA which is Ubiquitous and Robust Access Control proposed by Luo. Concurrently another routing protocol was proposed by Sanzgiri which defend the network from identified attacks. This is ARAN i.e. authenticated routing for ad hoc n ...
Smart Dust and TinyOS: Hardware and Software for Network
Smart Dust and TinyOS: Hardware and Software for Network

EN 2346467
EN 2346467

... maintains these routes as long as they are needed by the sources. Additionally, AODV forms trees which connect multicast group members. The trees are composed of the group members and the nodes needed to connect the members. AODV uses sequence numbers to ensure the freshness of routes. It is loop-fr ...
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

The expected length of a shortest path
The expected length of a shortest path

... distributed with mean l/p. Since the graph is fully connected, each of the I nodes in i have a path to u. Therefore, the rate at which the messages travel from nodes in i to the node v is the sum of the rates along all these paths, lt.~. q Theorem 4. Let 1 be the number of nodes in state i. Then the ...
A Comparative Analysis of Different Routing Scheme in Opportunistic Network Minakshi
A Comparative Analysis of Different Routing Scheme in Opportunistic Network Minakshi

Ad hoc On-Demand Distance Vector Routing.
Ad hoc On-Demand Distance Vector Routing.

... routing entries is a timer, called the route request expiration timer. The purpose of this timer is to purge reverse path routing entries from those nodes that do not lie on the path from the source to the destination. The expiration time depends upon the size of the adhoc network. Another important ...
ORALS--finals--oct31/Nov3--2007
ORALS--finals--oct31/Nov3--2007

... Software server ...
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

Network Flows 1. Introduction 1.3 Network Representations
Network Flows 1. Introduction 1.3 Network Representations

Distributed Systems: Concepts and Design Slides for Chapter 10
Distributed Systems: Concepts and Design Slides for Chapter 10

... • GUID computed by a secure hash function such as SHA-1 (see Chapter 11) using public key of node • Typically hash function is applied to the object name (or another known part of the object state) • 0 <= GUID <= 2128 - 1 Routing performance: • Order of log N steps when N nodes participate in system ...
Multiple Access Protocols Link Layer Addressing
Multiple Access Protocols Link Layer Addressing

... Stan Kurkovsky ...
IEEE Paper Template in A4 (V1) - Academic Science,International
IEEE Paper Template in A4 (V1) - Academic Science,International

Document
Document

... Reason to Use Dynamic Test Execution Suppose packet loss probability is L0, a test case is executed n times, and it passes n1 times and fails n2 times  If n1 > n2, then declare as pass, calculate the FN (false ...
Inglés
Inglés

... • Sequence number attack (Ning et al., 2003). Protocols such as aodv and dsdv (Destination Sequenced Distance Vector) (Hu et al., 2003 and 2002; Guerrero et al., 2002; Sanzgiri et al., 2002) create and keep routes by increasing the sequence numbers towards specific destinations. Since the sequence n ...
Interference-Aware Node Disjoint Multi-Path Dynamic Source
Interference-Aware Node Disjoint Multi-Path Dynamic Source

Unreliable Sensor Grids: Coverage, Connectivity and Diameter∗
Unreliable Sensor Grids: Coverage, Connectivity and Diameter∗

... the network and develop scaling laws for these quantities. Two important performance metrics for such a network are connectivity and coverage. We say that the network is connected if any active node can communicate with any other active node (possibly using other active nodes are relays). The unit s ...
Rain Technology - Teerthanker Mahaveer University
Rain Technology - Teerthanker Mahaveer University

... of internet as the most accepted medium for communication. But one of the most prominent problems with this client server based technology is that of maintaining a regular connection. Even if a sole intermediate node breaks down, the entire system crumples. The solution to this problem can be the us ...
< 1 ... 15 16 17 18 19 20 21 22 23 ... 42 >

Kademlia

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report