Search results for "Protocols"

showing 10 items of 782 documents

On the Fidelity of IEEE 802.11 commercial cards

2006

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

Signal processingCommunication channels (information theory); Internet; Signal processing; Wireless telecommunication systems; Baseband signals; Carrier sense function; MAC layer; Network protocolsComputer scienceMAC layerWireless local area networks (WLAN)backoff algorithmCommunication channels (information theory)IEEE 802.11Wireless telecommunication systemsNetwork protocolsThroughput (business)InternetBaseband signalsChannel allocation schemesSIMPLE (military communications protocol)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCarrier sense functionThroughputNetwork interface controllerEmbedded systemResource allocationbusinessComputer networkCommunication channel
researchProduct

New combinations for mantle cell lymphoma: concerted action needed.

2011

Sirolimusbusiness.industryLymphoma Mantle-Cellmedicine.diseaseArticleAntibodies Monoclonal Murine-DerivedOncologyAction (philosophy)Antineoplastic Combined Chemotherapy ProtocolsCancer researchMedicineHumansMantle cell lymphomabusinessRituximabThe Lancet. Oncology
researchProduct

Assessing Field and Laboratory Calibration Protocols for the Diviner 2000 Probe in a Range of Soils with Different Textures

2016

Frequency domain reflectometry (FDR) downhole sensors have been increasingly used for soil moisture field monitoring because they allow measurement, even continuously, along a soil profile. Moreover, they can also be installed with minimal soil disturbance around the access tube. The objectives of the paper were to assess the field and laboratory calibration protocols for a FDR capacitance probe (Diviner 2000) for a range of soils characterized by different particle size distributions and shrink/swell potential and to propose a practical and effective protocol on the basis of undisturbed soil samples, accounting for soil shrinkage/swelling processes characterizing swelling clay soils. The e…

Soil test0208 environmental biotechnologyShrinking/swellings soilCalibration protocolsSoil science02 engineering and technologySoil water contentCapacitance probeFrequency domain reflectometry (FDR); Capacitance probe; Soil water content; Dielectric permittivity; Shrinking/ swellings soils; Calibration protocols.Dielectric permittivityShrinking/ swellings soilsCalibrationReflectometryFrequency domain reflectometry (FDR)Water contentWater Science and TechnologyCivil and Structural EngineeringCalibration protocol04 agricultural and veterinary sciencesAgricultural and Biological Sciences (miscellaneous)Swell020801 environmental engineeringSoil water040103 agronomy & agriculture0401 agriculture forestry and fisheriesEnvironmental scienceSoil horizonCapacitance probeJournal of Irrigation and Drainage Engineering
researchProduct

Surgical treatment of solitary sternal metastasis from breast cancer Case report

2016

Bone metastasis is a frequent and early complication of breast cancer. This case report describes a technique for a partial exeresis of the sternum and the reconstruction of the pleura with autologous dermis from the lower abdomen and the loss of substance with a myocutaneous flap.We describe the case of a 50-year old woman with a sternal excavated lesion with pathologic fracture due to an invasive adenocarcinoma, treated with a partial exeresis of the sternum and the reconstruction with a myocutaneous flap.The patient doesn't show evidence of recurrent disease and the stability of her chest well preserved.Metastatic breast cancer to the sternum, if detected early and treated aggressively, …

SternumSettore MED/21 - Chirurgia ToracicaCytarabineBreast cancer Sternal metastasis SternectomyBone NeoplasmsBreast NeoplasmsAdenocarcinomaMiddle AgedCombined Modality TherapyMyocutaneous FlapSettore MED/18 - Chirurgia GeneraleFractures SpontaneousAntineoplastic Combined Chemotherapy ProtocolsHumansPleuraFemaleCyclophosphamideEpirubicin
researchProduct

Evaluating the microscopic effect of brushing stone tools as a cleaning procedure

2020

Cleaning stone tool surfaces is a common procedure in lithic studies. The first step widely applied at any archeological site (and/or at field laboratories) is the gross removal of sediment from the surfaces of artifacts. Lithic surface alterations due to mechanical action applied in wet or dry cleaning regimes have never been examined at a microscopic scale. This could have important implications in traceology, as any modern surface modifications inflicted on archeological artifacts might compromise their functional interpretations. The current trend toward quantification of use-wear traces makes the testing even more important, as even slight, apparently invisible surface alterations migh…

Stone toolbepress|Social and Behavioral Sciences|AnthropologyBrushing010506 paleontologyCleaning protocolsSocArXiv|Social and Behavioral Sciences|AnthropologyDry cleaningengineering.material010502 geochemistry & geophysicsUse-wear analysis01 natural sciencesMicroscopic scaleSocArXiv|Social and Behavioral Sciences|Anthropology|Archaeological AnthropologyStone toolsConfocal microscopyMining engineeringengineeringSurface roughnessbepress|Social and Behavioral Sciences|Anthropology|Archaeological Anthropologybepress|Social and Behavioral SciencesSocArXiv|Social and Behavioral SciencesControlled experimentGeology0105 earth and related environmental sciencesEarth-Surface Processes
researchProduct

Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation

2014

The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…

Technology and EngineeringCognitive networksComputer Networks and CommunicationsComputer scienceDynamic MAC adaptationTime division multiple access02 engineering and technologyMAC protocolMAC protocols0202 electrical engineering electronic engineering information engineeringWirelessCross-technology interferenceINTERFERENCEProtocol prototypingSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsCognitive networkComputer Science ApplicationsEmbedded systemSignal ProcessingInterference avoidanceIBCNWireless network control020201 artificial intelligence & image processingbusinessCognitive networkDecoupling (electronics)Communication channelComputer networkEURASIP Journal on Wireless Communications and Networking
researchProduct

Technologies supporting vision screening: a protocol for a scoping review

2021

Introduction Vision problems affect academic performance, social and mental health. Most traditional vision screening methods rely on human expert assessments based on a set of vision tests. As technology advances, new instruments and computerised tools are available for complementing vision screening. The scoping review based on this protocol aims to investigate current technologies for vision screening, what vision tests can be complemented by technologies, and how these can support vision screening by providing measurements. Methods and analysis The planned review will utilise the PRISMA extension for Scoping Reviews (PRISMA-ScR) tool. Electronic search will be performed in databases, i…

Technologygenetic structuresprotocols & guidelinesPeer ReviewMEDLINEHealth InformaticsLogic modelHealth informaticsquality in health careVision Screeninginformation technologyReference management software1702HumansMedicine1506Vision testProtocol (science)business.industryRInformation technologyGeneral Medicineeducation & training (see medical education & training)Data scienceReview Literature as TopicMental HealthMedicineThematic analysisbusinesscommunity child healthSystematic Reviews as Topic
researchProduct

Challenging aspects in Consensus protocols for networks

2008

Results on consensus protocols for networks are presented. The basic tools and the main contribution available in the literature are considered, together with some of the related challenging aspects: estimation in networks and how to deal with disturbances is considered. Motivated by applications to sensor, peer-to- peer, and ad hoc networks, many papers have considered the problem of estimation in a consensus fashion. Here, the unknown but bounded (UBB) noise affecting the network is addressed in details. Because of the presence of UBB disturbances convergence to equilibria with all equal components is, in general, not possible. The solution of the epsiv-consensus problem, where the states…

Theoretical computer scienceAutomatic controlConsensus problemsWireless ad hoc networkStochastic processEstimation theoryComputer scienceDistributed computingMulti-agent systemConsensus problems; Consensus protocolsConsensus protocolsBounded functionConvergence (routing)Wireless sensor network
researchProduct

Consensus in Noncooperative Dynamic Games: a Multi-Retailer Inventory Application

2008

We focus on Nash equilibria and Pareto optimal Nash equilibria for a finite horizon noncooperative dynamic game with a special structure of the stage cost. We study the existence of these solutions by proving that the game is a potential game. For the single-stage version of the game, we characterize the aforementioned solutions and derive a consensus protocol that makes the players converge to the unique Pareto optimal Nash equilibrium. Such an equilibrium guarantees the interests of the players and is also social optimal in the set of Nash equilibria. For the multistage version of the game, we present an algorithm that converges to Nash equilibria, unfortunately, not necessarily Pareto op…

TheoryofComputation_MISCELLANEOUSComputer Science::Computer Science and Game TheoryCorrelated equilibriumSequential gameComputer scienceDynamic programmingSubgame perfect equilibriumsymbols.namesakeCoordination gameElectrical and Electronic EngineeringRisk dominanceFolk theoremPrice of stabilityNon-credible threatGame theoryCentipede gameImplementation theoryNon-cooperative gameInventoryNormal-form gameStochastic gameComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERALComputer Science ApplicationsConsensus protocols; Dynamic programming; Game theory; InventoryConsensus protocolsZero-sum gameControl and Systems EngineeringNash equilibriumEquilibrium selectionBest responsesymbolsRepeated gameEpsilon-equilibriumConsensus protocols; Dynamic programming; Game theory; Inventory;Potential gameSolution conceptMathematical economicsGame theory
researchProduct

Distributed Consensus in Noncooperative Inventory Games

2009

This paper deals with repeated nonsymmetric congestion games in which the players cannot observe their payoffs at each stage. Examples of applications come from sharing facilities by multiple users. We show that these games present a unique Pareto optimal Nash equilibrium that dominates all other Nash equilibria and consequently it is also the social optimum among all equilibria, as it minimizes the sum of all the players’ costs. We assume that the players adopt a best response strategy. At each stage, they construct their belief concerning others probable behavior, and then, simultaneously make a decision by optimizing their payoff based on their beliefs. Within this context, we provide a …

TheoryofComputation_MISCELLANEOUSComputer Science::Computer Science and Game TheoryInformation Systems and ManagementGeneral Computer ScienceManagement Science and Operations ResearchIndustrial and Manufacturing Engineeringsymbols.namesakeSettore ING-INF/04 - AutomaticaGame theory; Multi-agent systems; Inventory; Consensus protocolsEconomicsRisk dominanceGame theoryMulti-agent systemsStochastic gameInventoryComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERALRationalizabilityConsensus protocols; Game theory; Inventory; Multi-agent systemsConsensus protocolsMulti-agent systemNash equilibriumEquilibrium selectionModeling and SimulationBest responsesymbolsRepeated gameEpsilon-equilibriumSettore MAT/09 - Ricerca OperativaMathematical economics
researchProduct