Welcome![Sign In][Sign Up]
Location:
Search - coverage protocols

Search list

[DocumentsBiblio-java

Description: This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
Platform: | Size: 60416 | Author: isclor | Hits:

[Industry researchScreenshots

Description: This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
Platform: | Size: 534528 | Author: isclor | Hits:

[Software Engineeringfuture

Description: This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
Platform: | Size: 3072 | Author: isclor | Hits:

[File FormatActivity

Description: This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
Platform: | Size: 4096 | Author: isclor | Hits:

[Successful incentiveWorkflow

Description: This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
Platform: | Size: 3072 | Author: isclor | Hits:

[VC/MFCWebUsage

Description: This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
Platform: | Size: 4096 | Author: isclor | Hits:

[OtherASN1Complete

Description: ASN.1 Complete teaches you everything you need to know about ASN.1-whether you re specifying a new protocol or implementing an existing one in a software or hardware development project. Inside, the author begins with an overview of ASN.1 s most commonly encountered features, detailing and illustrating standard techniques for using them. He then goes on to apply the same practice-oriented approach to all of the notation s other features, providing you with an easy-to-navigate, truly comprehensive tutorial. The book also includes thorough documentation of both the Basic and the Packed Encoding Rules-indispensable coverage for anyone doing hand-encoding, and a valuable resource for anyone wanting a deeper understanding of how ASN.1 and ASN.1 tools work. The concluding section takes up the history of ASN.1, in terms of both the evolution of the notation itself and the role it has played in hundreds of protocols and thousands of applications developed since its inception.
Platform: | Size: 881664 | Author: cyiin | Hits:

[Program docNetwork-Processors--Architectures--Protocols-and-

Description: Network processing units (NPUs) will be the occasion of sweeping changes in the network hardware industry over the next few years. This new breed of microchip impacts chip designers like Intel, equipment vendors like Cisco, application developers like IBM and Morotola, and an army of software engineers who spent the last decade working on protocols and network management solutions. A thoroughly practical dissection of the early NPU market, this designer s guide explains how network processors work and provides detailed information on all major commercial architectures, from features to design considerations. Comparative tables are a rich source of cross-industry info. Coverage includes traffic managers, classification chips, content-addressable memories, switch fabrics, security accelerators, storage coprocessors and NetASICs.
Platform: | Size: 2688000 | Author: Globalcitizen | Hits:

CodeBus www.codebus.net