[引用][C] 利用無線訊號進行動態路徑追蹤之研究

張懷宇 - 2011 - 碩士(Master)

[PDF][PDF] 阁EasyChair Preprint

A Gohar, C Rong, S Lee - 2023 - easychair.org
… stringent reliability and security requirements. In virtualized … during virtual network embedding
(VNE), the procedure of allocating VNs … We consider the following resources for each LC …

無線感測網路中具可靠傳輸之路由協定

張振龍, 趙禧綠 - 2005 - ir.lib.nycu.edu.tw
… two reliable routing protocols for wireless sensor networks … Once we deploy those sensor
nodes in random fashion or in manual … When using multi-path, we consider the first duplicated …

一個分散式環境的主從服務管理系統

黃士展 - 1994 - ir.lib.nycu.edu.tw
… 性(Scalibility)及可靠性(Reliability)等問題有所 討論. … network just like the processes in aocal
host. A management system should have three characteristics , it is still necessary to consider

Fatman: 基于低成本自愿者资源而建立的可靠归档存储系统

覃安, 胡殿明, 刘俊, 杨文君, 谭待 - 计算机科学技术学报, 2015 - jcst.ict.ac.cn
reliability loss, but it brings in a tenfold overhead in network … The hybrid-deployed contributory
application will cause … While for cold data, RSbased decoding also needs to consider CPU …

第12 回IEEE High Performance Computing and

趙来, 平, 櫻井 - 2010 - ipsj.ixsq.nii.ac.jp
… computing resources in a large network of desktop computers, is … for reliable execution of
parallel computing applications on … requirements, and considering quality of service constraints. …

[PDF][PDF] Achieving low carbon local energy communities in hot climates by 價) exploiting networks synergies in multi energy systems T

A Romagnoli - Applied Energy, 2019 - academia.edu
… cities and districts must consider the synergies between all … user, ensuring higher service
reliability and reduced energy … and span of potential technologies to deploy, according to the …

點對點環境下的通用發佈/訂閱框架

簡士強 - 2007 - ir.lib.nycu.edu.tw
… pub/sub service SPIs which focused on deploying pub/sub … By considering the practicality
of creating P2P applications, … the performance and reliability of P2P networks. In conclusion, …

比空白保护得更多: 社交网络中用户敏感信息的反学习

袁明轩, 陈雷, 梅宏 - 计算机科学技术学报, 2014 - jcst.ict.ac.cn
… missing labels in the social networks with high accuracy. The attacks through links, … consider
personalized user privacy preference setting (publish the labels that a user wants to publish

[引用][C] Pt, AssnrnG. reprIRODUCTrON AND EgpER 器ENCE OF SIGNXLLrns SYsrnrEpl NUMBER 7 in SWEDEN

N Weidstarn