Xem 1-4 trên 4 kết quả Delay sensitive applications
  • In the latest years much research effort was devoted to envision a new paradigm for wireless transmission. Results from recent works (Wireless Word Research Forum, 2005) indicate that a possible solution would lie in utilizing in a more efficient manner the diverse Radio Access Technologies1 (RATs) that are available nowadays, with the purpose of enabling interoperability among them and convergence into one global telecom infrastructure (beyond 3G).

    pdf0p wqwqwqwqwq 06-07-2012 47 10   Download

  • Global Navigation Satellite System (GNSS) plays a key role in high precision navigation, positioning, timing, and scientific questions related to precise positioning. This is a highly precise, continuous, all-weather, and real-time technique. The book is devoted to presenting recent results and developments in GNSS theory, system, signal, receiver, method, and errors sources, such as multipath effects and atmospheric delays

    pdf0p cucdai_1 16-10-2012 41 9   Download

  • SQL injection vulnerabilities have been described as one of the most serious threats for Web applications [3, 11]. Web applica- tions that are vulnerable to SQL injection may allow an attacker to gain complete access to their underlying databases. Because these databases often contain sensitive consumer or user information, the resulting security violations can include identity theft, loss of con- fidential information, and fraud. In some cases, attackers can even use an SQL injection vulnerability to take control of and corrupt the system that hosts the Web application.

    pdf12p khongmuonnghe 04-01-2013 12 2   Download

  • In Exchange 2000, the ADC schema files were a subset of the Exchange 2000 core schema files. So although the ADC’s setup /schemaonly switch extended the schema, customers were required to perform further schema extensions using setup /forestprep. This meant longer lockdown periods for larger customers whose custom applications were sensitive to schema extensions due to the delayed nature of replications and resetting of indexed attributes. (You may refer to KB article 230662 for more information on indexed attributes)...

    pdf72p thutrang 31-08-2009 94 5   Download

Đồng bộ tài khoản