Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"

showing 10 items of 449 documents

Unified kinetic formulation of incoherent waves propagating in nonlinear media with noninstantaneous response

2010

This article presents a unified kinetic formulation of partially coherent nonlinear optical waves propagating in a noninstantaneous response Kerr medium. We derive a kinetic equation that combines the weak Langmuir turbulence kinetic equation and a Vlasov-like equation within a general framework: It describes the evolution of the spectrum of a random field that exhibits a quasistationary statistics in the presence of a noninstantaneous nonlinear response. The kinetic equation sheds new light on the dynamics of partially coherent nonlinear waves and allows for a qualitative interpretation of the interplay between the noninstantaneous nonlinearity and the nonstationary statistics of the incoh…

Physics[MATH.MATH-PR] Mathematics [math]/Probability [math.PR]Random fieldField (physics)Langmuir TurbulenceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSKinetic energy01 natural sciencesInstabilityAtomic and Molecular Physics and Optics010305 fluids & plasmas[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]Nonlinear systemModulational instabilityClassical mechanics0103 physical sciences010306 general physicsGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)RandomnessComputingMilieux_MISCELLANEOUSMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Condensation and thermalization of classsical optical waves in a waveguide

2011

http://pra.aps.org/; International audience; We consider the long-term evolution of a random nonlinear wave that propagates in a multimode optical waveguide. The optical wave exhibits a thermalization process characterized by an irreversible evolution toward an equilibrium state. The tails of the equilibrium distribution satisfy the property of energy equipartition among the modes of the waveguide. As a consequence of this thermalization, the optical field undergoes a process of classical wave condensation, which is characterized by a macroscopic occupation of the fundamental mode of the waveguide. Considering the nonlinear Schrödinger equation with a confining potential, we formulate a wav…

Physics::OpticsOptical field01 natural sciencesWaveguide (optics)Electromagnetic radiationoptical instabilitiesSchrödinger equation010309 opticssymbols.namesakeand lossesQuantum mechanics0103 physical sciencesDynamics of nonlinear optical systemssolitons010306 general physicsPropagationGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)ComputingMilieux_MISCELLANEOUSUltraviolet catastrophePhysics[PHYS.PHYS.PHYS-OPTICS]Physics [physics]/Physics [physics]/Optics [physics.optics][ PHYS.PHYS.PHYS-OPTICS ] Physics [physics]/Physics [physics]/Optics [physics.optics]and optical spatio-temporal dynamicsscatteringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWave equationAtomic and Molecular Physics and Optics[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]ThermalisationCross-polarized wave generationsymbolsoptical chaos and complexityMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

A Low-level Simulation Study of Prioritization in IEEE 802.11e Contention-based Networks

2006

This work deals with the performance evaluation of the IEEE 802.11e EDCA proposal for service prioritization in Wireless LANs. A large amount of study has been carried out in the scientific community to evaluate the performance of the EDCA proposal, mainly in terms of throughput and access delay differentiation. However, we argue that further performance insights are needed in order to fully understand the principles behind the EDCA prioritization mechanisms. To this purpose, rather than limit our investigation on throughput and delay performance figures, we take a closer look to their operation also in terms of low-level performance metrics (such as probability of accessing specific channe…

PrioritizationIEEE 802Service (systems architecture)Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputlaw.inventionlawLimit (music)Wireless lanWi-FibusinessCommunication channelComputer network
researchProduct

Pharmacological interventions for schizotypal personality disorder

2014

Reason for withdrawal from publication Authors have made no progress with this protocol in over a year due to difficulties with identifying potentially suitable studies. The protocol has been withdrawn. To view the published versions of this article, please click the 'Other versions' tab.

Protocol (science)medicine.medical_specialtyPsychotherapistPharmacological interventionsgenetic structuresbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmedicineAlternative medicinemedicine.diseasebusinessSchizotypal personality disorderArticle
researchProduct

Psychological interventions for obsessive-compulsive personality disorder

2010

Reason for withdrawal from publication Authors have made no progress with this protocol in over three years due to difficulties with identifying potentially suitable studies. The protocol has been withdrawn. To view the published versions of this article, please click the 'Other versions' tab.

Protocol (science)medicine.medical_specialtyPsychotherapistgenetic structuresbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAlternative medicinePsychological interventionMEDLINEmedicine.diseaseArticleObsessive–compulsive personality disordermedicinebusiness
researchProduct

Pharmacological interventions for paranoid personality disorder

2014

Reason for withdrawal from publication Authors have made no progress with this protocol in over three years due to difficulties with identifying potentially suitable studies. The protocol has been withdrawn. To view the published versions of this article, please click the 'Other versions' tab.

Protocol (science)medicine.medical_specialtyPsychotherapistgenetic structuresbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMEDLINEAlternative medicinemedicine.diseaseArticlePharmacological interventionsParanoid personality disordermedicinebusiness
researchProduct

Test-Bed Evaluation of CA and CF via a Software Defined Radio

2019

In Chaps. 3 and 4, we presented the analytical models and simulation approaches to study the impact of CA and CF on traffic flows in the single-flow single-user and the single-flow multi-user systems. In this chapter, we investigate the impact of CA and CF in a test-bed. We employ a software defined radio (SDR) from National Instruments (NI) to evaluate the performance of a CR system with user datagram protocol (UDP) flows. The adopted SDR is based on LTE protocol stack with additional functionalities that can support CA and CF, and accommodating PUs. By conducting measurements based on the test-bed system, we will be able to confirm that performance improvement can indeed be obtained by ap…

Protocol stackbusiness.industryComputer scienceEmbedded systemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSUser Datagram ProtocolSoftware-defined radioPerformance improvementbusiness
researchProduct

"Table 2" of "Search for squarks and gluinos with the ATLAS detector in final states with jets and missing transverse momentum using 4.7 fb^-1 of sqr…

2012

The meff_incl distribution in Signal Region Ap.

Proton-Proton ScatteringDN/DMComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSExclusive7000.0Single Differential DistributionJet ProductionP P --> JETS MMMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Domain Generation Algorithm Detection Using Machine Learning Methods

2018

A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…

Pseudorandom number generatorDomain generation algorithmAlphanumericComputer sciencebusiness.industryDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBotnetDenial-of-service attackMachine learningcomputer.software_genreComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSCryptoLockerMalwareArtificial intelligencebusinesscomputer
researchProduct

Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks

2008

Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multi- hop wireless networks. Despite these advances, however, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which one-hop flows contend with two-hop flows for gateway access. In this paper, we demonstrate via real network measurements, test-bed experiments, and an analytical model that starvation exists in such a scenario, i.e., the one-hop flow receives most of the bandwidth while the two- hop flow starves. Our analytical model yields a solution consisting of a simple contention window policy that can be implemented via mechanism…

Queueing theoryComputer sciencebusiness.industryWireless networkDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingThroughputNetwork topologyHop (networking)Default gatewayWireless lanWirelessbusinessComputer networkIEEE INFOCOM 2008 - The 27th Conference on Computer Communications
researchProduct