Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Ping-Hai Hsu"'
Autor:
Ping-Hai Hsu, 徐彬海
96
How to increase system or service availability and to reach carrier grade is always a grand challenge for telecom equipment venders and service providers. The thesis adopts Advanced Telecom Computing Architecture (ATCA) as a hardware platform
How to increase system or service availability and to reach carrier grade is always a grand challenge for telecom equipment venders and service providers. The thesis adopts Advanced Telecom Computing Architecture (ATCA) as a hardware platform
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/93420827391758732059
Publikováno v:
GCCE
By applying power usage statistics from smart meters, users are able to save energy in their homes or control smart appliances via home automation systems. However, owing to security and privacy concerns, it is recommended that smart meters (SM) shou
Publikováno v:
annals of telecommunications - annales des télécommunications. 69:379-389
The popularity of the Internet has increased the ease of online access to malicious software, and the amount of software designed to perform denial-of-service (DoS) attacks is incalculable. This enables hackers to use online resources to easily launc
Publikováno v:
GCCE
By applying the knowledge of customer power usage statistics from smart meters, power companies are able to improve the quality and efficiency of power delivery. However, using electrical usage data bears privacy issues. This study presents a novel u
Publikováno v:
IEEE Transactions on Reliability. 60:675-688
Network lifetime predictability is an essential system requirement for the type of wireless sensor network (WSN) used in safety-critical and highly-reliable applications. All sensor nodes in these time-critical WSNs should meet the lifetime constrain
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642356056
NPC
NPC
A denial-of-service (DoS) / distributed-denial-of-service (DDoS) attack may result in rapid resource depletion along the attack path. For stepping-stone and masquerading techniques typically used in DoS/DDoS attacks such as internet protocol (IP) or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b104f4036f8e4dcc382fdbb924705d1f
https://doi.org/10.1007/978-3-642-35606-3_12
https://doi.org/10.1007/978-3-642-35606-3_12
Publikováno v:
2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
We analysis the Taiwani¦s electric environment and theTaiwani¦s AMI architecture. The AMI system for high-voltage users has stared trial run. However, that for low-voltage users has begun to design. Here, we first design an available protocol archi
Publikováno v:
GLOBECOM
We propose a practical Ethernet access architecture to support high availability and service continuity for IPTV. To reduce the per-line cost, our approach is interconnecting switches, most of which are low-cost, in a hierarchical fashion to provide
Publikováno v:
2011 Ninth IEEE International Symposium on Parallel & Distributed Processing with Applications Workshops (ISPAW); 2011, p105-110, 6p
Publikováno v:
2010 International Symposium on Communications & Information Technologies (ISCIT); 2010, p267-272, 6p