mosque 发表于 2025-3-23 11:50:34

http://reply.papertrans.cn/24/2305/230464/230464_11.png

obstruct 发表于 2025-3-23 14:16:37

http://reply.papertrans.cn/24/2305/230464/230464_12.png

Observe 发表于 2025-3-23 18:23:21

Timer and Sequence Based Packet Loss Detection Scheme for Efficient Selective Retransmission in DCCion scheme, many research works have proposed selective retransmission methods for DCCP to improve QoS of applications. However, these researches do not consider packet loss detection scheme although existing packet loss detection schemes are not appropriate for efficient retransmission. This paper

avenge 发表于 2025-3-23 23:11:34

http://reply.papertrans.cn/24/2305/230464/230464_14.png

健谈的人 发表于 2025-3-24 03:49:40

Load Performance Evaluation of the SSD According to the Number of Concurrent Users, results, we showed that load performance of DRAM-SSD is about 20times more than that of the HDD. DRAM-SSD is useful for application which has many concurrent users such as first come first served system.

顶点 发表于 2025-3-24 08:24:31

http://reply.papertrans.cn/24/2305/230464/230464_16.png

抱狗不敢前 发表于 2025-3-24 12:38:02

Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Networ and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information

frenzy 发表于 2025-3-24 15:59:16

A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information.  Therefore, the development

细胞膜 发表于 2025-3-24 20:58:33

An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique,ia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional acces

拘留 发表于 2025-3-24 23:53:30

http://reply.papertrans.cn/24/2305/230464/230464_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Communication and Networking; International Confer Tai-hoon Kim,Alan Chin-Chen Chang,Dominik Ślęzak Conference proceedings 2010 Springer Be