A routing scheme for content based networking. Content-based network is a network which does nt make use of the source or the destination address to forward a message. This network is quite different from the traditional network.
标签: network Content-based networking routing
上传时间: 2013-11-25
上传用户:lizhen9880
This book is based on a Ph.D. research that has been conducted at the Delft University of Technology in the Netherlands in collaboration with Dutch Electricity & Gas Distribution Network Operator, Stedin. This book was written as a result of wider interest that was shown by different industry groups on this topic after its public defence. This inspired the author to modify and publish a practical version of the research for a greater international audience. Therefore, the content of this book is intended for a double audience, on the one hand for those interested in the organisational and management aspects of maintenance.
标签: Maintenance Electricity Risk-Based Network for
上传时间: 2020-06-07
上传用户:shancjb
An easy, yet highly-configurable iptables-based firewall solution designed for everybody from home users to network admins. Functionality for IPv6, tunneling, IPSec, and advanced routing is planned.
标签: highly-configurable iptables-based everybody designed
上传时间: 2014-10-11
上传用户:huyiming139
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware. It consists of a loadable kernel module (kvm.ko) and a userspace component. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. The kernel component of KVM is included in mainline Linux, and will appear in Linux 2.6.20. KVM is open source software.
标签: virtualization Kernel-based for hardware
上传时间: 2015-08-20
上传用户:lijianyu172
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544
there are some other approaches, such as Schedule Network Templates, dependency Determination, and Applying Leads and Lags. They are also use with PDM and ADM together for sequencing activities. Based on the different size or type of project, the managers should choose suitable approaches.
标签: Determination approaches dependency Templates
上传时间: 2013-12-24
上传用户:aa17807091
DTNSim2 is a simulator for Delay-Tolerant Networks (DTNs) written in Java. It is based on Sushant Jain s DTNSim, which was used for the Routing in a delay tolerant network paper. It has been exensively modified.
标签: Delay-Tolerant simulator Networks DTNSim2
上传时间: 2016-11-06
上传用户:tianyi223
VLSi KL partitioning Algorithm based programme for 100 nodes. It s dynamic progremme so by changing the MAX value we can change the number of nodes in the network.
标签: partitioning Algorithm programme progremme
上传时间: 2013-12-05
上传用户:wweqas
David Vernon is the Coordinator of the European Network for the Advancement of Artificial Cognitive Systems and he is a Visiting Professor of Cognitive Systems at the University of Genoa. He is also a member of the management team of the RobotCub integrated working on the development of open-source cognitive humanoid robot. Over the past 27 years, he has held positions at Westinghouse Electric, Trinity College Dublin, the European Commission, the National University of Ireland Maynooth, Science Foundation Ireland, and Etisalat University College. He has authored two and edited three books on computer vision and has published over eighty papers in the fields of Computer Vision, Robotics, and Cognitive Systems. His research interests include Fourier-based computer vision and enactive approaches to cognition. He is currently a Professor at Etisalat University College in Sharjah-United Arab Emirates, focusing on Masters programs by research in Computing fields.".[1]
标签: the Coordinator Advancement Artificial
上传时间: 2014-01-08
上传用户:netwolf
WiseMAC is a medium access control protocol designed for the WiseNETTMwireless sensor network. It is based on CSMA and uses the preamble sampling technique to minimize the power consumed when listening to an idle medium.
标签: WiseNETTMwireless designed protocol WiseMAC
上传时间: 2014-01-20
上传用户:x4587