Search ResultsElektronik Kaynaklar 
by
Xue, Jiachen, author.
Format:
Alıntı:
provides hop-by-hop flow control but not end-to-end congestion control. (2) The well-known incast problem
by
Kibble, Geoffrey A., author.
Format:
Alıntı:
often provide benefits with the expense of drag or increased cost. Many flow control methods have come
by
Murmuria, Rahul, author. (orcid)0000-0001-6327-9609
Format:
Alıntı:
access control mechanism to the device, their application poses new security risks and it does not
by
Rodolfo, Inês Martins Sequeira, author.
Format:
Alıntı:
gaining control over their personal health information in a seamless way. Most importantly, so that people
by
Wang, Ying, author.
Format:
Alıntı:
, time division, power control, and space division. Nevertheless, many problems not addressed adequately
by
Williamson, John, author.
Format:
Alıntı:
probabilistic selection technique based on the detection of control. Methods are presented for displaying the
by
Zelkowitz, Marvin V., 1945-
Format:
Alıntı:
Strategies; 5. Ineffective Exception-handling Design Patterns; References; Chapter 6. Managing Control
by
Davis, John McDonald Cameron, author.
Format:
Alıntı:
implementation via the network control programs are considered. Chapter 3 examines the interconnection of network
by
Rubinoff, Morris.
Format:
Alıntı:
. Techniques of System Access Control; 3. Computer Characteristics Supporting Information Security; 4
by
Wang, An, author.
Format:
Alıntı:
. However, this comes at the expense of fine-grained policy control, visibility, and flexibility in traffic
by
Fernandez Gonzalez, Enrique, author.
Format:
Alıntı:
planning problems by supporting convex quadratic constraints on state variables and control variables that
by
Du, Pengyuan, author.
Format:
Alıntı:
) paradigm to centralize network control and management. Moreover, it adopts a newly emerged transport layer

Eylem Seç





