Search ResultsElektronik Kaynaklar 
by
Xue, Jiachen, author.
Format:
Alıntı:
provides hop-by-hop flow control but not end-to-end congestion control. (2) The well-known incast problem
by
Kibble, Geoffrey A., author.
Format:
Alıntı:
often provide benefits with the expense of drag or increased cost. Many flow control methods have come
by
Murmuria, Rahul, author. (orcid)0000-0001-6327-9609
Format:
Alıntı:
access control mechanism to the device, their application poses new security risks and it does not
by
Rodolfo, Inês Martins Sequeira, author.
Format:
Alıntı:
gaining control over their personal health information in a seamless way. Most importantly, so that people
by
Wang, Ying, author.
Format:
Alıntı:
, time division, power control, and space division. Nevertheless, many problems not addressed adequately
by
Williamson, John, author.
Format:
Alıntı:
probabilistic selection technique based on the detection of control. Methods are presented for displaying the
by
Zelkowitz, Marvin V., 1945-
Format:
Alıntı:
Strategies; 5. Ineffective Exception-handling Design Patterns; References; Chapter 6. Managing Control
by
Davis, John McDonald Cameron, author.
Format:
Alıntı:
implementation via the network control programs are considered. Chapter 3 examines the interconnection of network
by
Rubinoff, Morris.
Format:
Alıntı:
. Techniques of System Access Control; 3. Computer Characteristics Supporting Information Security; 4
by
Wang, An, author.
Format:
Alıntı:
. However, this comes at the expense of fine-grained policy control, visibility, and flexibility in traffic
by
Behzadnia, Peyman, author.
Format:
Alıntı:
integrated with model predictive control (MPC) strategy to minimize power consumption of the disk
by
Kurkcu, Abdullah, author.
Format:
Alıntı:
information-sharing, drivers will have the opportunity of putting themselves in control of their own destiny

Eylem Seç





