Academic literature on the topic 'Dropped messages'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dropped messages.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dropped messages"

1

Kumar, Saptaparni, and Jennifer L. Welch. "Implementing ♢P with Bounded Messages on a Network of ADD Channels." Parallel Processing Letters 29, no. 01 (2019): 1950002. http://dx.doi.org/10.1142/s0129626419500026.

Full text
Abstract:
We present an implementation of the eventually perfect failure detector [Formula: see text] from the original hierarchy of the Chandra-Toueg [3] oracles on an arbitrary partitionable network composed of unreliable channels that can lose and reorder messages. Prior implementations of [Formula: see text] have assumed different partially synchronous models ranging from bounded point-to-point message delay and reliable communication to unbounded message size and known network topologies. We implement [Formula: see text] under very weak assumptions on an arbitrary, partitionable network composed of
APA, Harvard, Vancouver, ISO, and other styles
2

Branch, Philip, Binghao Li, and Kai Zhao. "A LoRa-Based Linear Sensor Network for Location Data in Underground Mining." Telecom 1, no. 2 (2020): 68–79. http://dx.doi.org/10.3390/telecom1020006.

Full text
Abstract:
In this paper, we describe a LoRa (from “Long Range”)-based, linear sensor network we have developed for transmitting location information of personnel and equipment in an underground mine. The system is intended to be used during emergencies when existing communications infrastructure has failed. Linear networks comprise a sequence of relays that forward data to a common destination, the headend. Relays forward location information transmitted from tags carried by personnel or equipment. Relays will usually be put in place as investigators or rescuers enter the mine. LoRa is used both by the
APA, Harvard, Vancouver, ISO, and other styles
3

GIANNELLA, CHRIS, RANSOM WINDER, and STACY PETERSEN. "Dropped personal pronoun recovery in Chinese SMS." Natural Language Engineering 23, no. 6 (2017): 905–27. http://dx.doi.org/10.1017/s1351324917000158.

Full text
Abstract:
AbstractIn written Chinese, personal pronouns are commonly dropped when they can be inferred from context. This practice is particularly common in informal genres like Short Message Service messages sent via cell phones. Restoring dropped personal pronouns can be a useful preprocessing step for information extraction. Dropped personal pronoun recovery can be divided into two subtasks: (1) detecting dropped personal pronoun slots and (2) determining the identity of the pronoun for each slot. We address a simpler version of restoring dropped personal pronouns wherein only the person numbers are
APA, Harvard, Vancouver, ISO, and other styles
4

Intisar, Al-Mejibli1 Martin Colley2 and Salah Al-Majeed3. "NETWORKS UTILIZATION IMPROVEMENTS FOR SERVICE DISCOVERY PERFORMANCE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 1, November (2018): 01–17. https://doi.org/10.5281/zenodo.1451182.

Full text
Abstract:
Service discovery requests’ messages have a vital role in sharing and locating resources in many of service discovery protocols. Sending more messages than a link can handle may cause congestion and loss of messages which dramatically influences the performance of these protocols. Re-send the lost messages result in latency and inefficiency in performing the tasks which user(s) require from the connected nodes. This issue become a serious problem in two cases: first, when the number of clients which performs a service discovery request is increasing, as this result in increasing in the n
APA, Harvard, Vancouver, ISO, and other styles
5

Kluss, Benedikt, Samaneh Rashidibajgan, and Thomas Hupperich. "Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 75. http://dx.doi.org/10.3390/jsan11040075.

Full text
Abstract:
Opportunistic networks are an enabler technology for typologies without centralized infrastructure. Portable devices, such as wearable and embedded mobile systems, send relay messages to the communication range devices. One of the most critical challenges is to find the optimal route in these networks while at the same time preserving privacy for the participants of the network. Addressing this challenge, we presented a novel routing algorithm based on device clusters, reducing the overall message load and increasing network performance. At the same time, possibly identifying information of ne
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmad, Farhan, Asma Adnane, Virginia Franqueira, Fatih Kurugollu, and Lu Liu. "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies." Sensors 18, no. 11 (2018): 4040. http://dx.doi.org/10.3390/s18114040.

Full text
Abstract:
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-T
APA, Harvard, Vancouver, ISO, and other styles
7

Patil, Anand N., and Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission." Journal of Autonomous Intelligence 6, no. 2 (2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.

Full text
Abstract:
<p>Adaptive transport technologies based on vehicular ad hoc networks (VANET) has proven considerable potential in light of the developing expansion of driver assistance and automobile telecommunication systems. However, confidentiality and safety are the vital challenges in vehicular ad hoc networks which could be seriously impaired by malicious attackers. While protecting vehicle privacy from threats, it is imperative to stop internal vehicles from putting out bogus messages. Considering these issues, a novel machine learning based message authentication combined with blockchain and in
APA, Harvard, Vancouver, ISO, and other styles
8

Колмогорова, С. С., та И. В. Захаров. "Реализация технологии «издатель/подписчик» для организации взаимодействия движущихся и стационарных объектов". Vestnik of Volga State University of Technology. Series Radio Engineering and Infocommunication Systems, № 3(63) (14 листопада 2024): 43–52. https://doi.org/10.25686/2306-2819.2024.3.43.

Full text
Abstract:
В статье рассматривается организация фрагмента технологической сети передачи данных между мобильными и неподвижными объектами в системе сбора данных с сенсорных элементов. В основе рассматриваемого фрагмента сети лежит обмен информационными и командными сообщениями по беспроводным каналам передачи данных между пунктом управления и стационарными, мобильными объектами в двухстороннем порядке. В качестве возможного решения рассматривается технология «издатель/подписчик». По результатам проведённого исследования выбран наиболее подходящий брокер сообщений (RabbitMQ) под задачи связи мобильных и ст
APA, Harvard, Vancouver, ISO, and other styles
9

Shahariar, Rezvi, and Abu Naser. "Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node." Dhaka University Journal of Science 62, no. 2 (2015): 141–45. http://dx.doi.org/10.3329/dujs.v62i2.21979.

Full text
Abstract:
In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node’s total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approa
APA, Harvard, Vancouver, ISO, and other styles
10

Stark, Elisabeth, and Aurélia Robert-Tissot. "Subject drop in Swiss French text messages." Linguistic Variation 17, no. 2 (2017): 251–71. http://dx.doi.org/10.1075/lv.14020.sta.

Full text
Abstract:
Abstract In this paper, we present evidence in favour of a syntactic approach to subject drop in Swiss French text messages. Subject drop in our corpus follows patterns found in various so-called "written abbreviated registers" such as diaries, notes etc.: it occurs at the beginning of main sentences and after preposed adjuncts. Based on a corpus of 1100 text messages, collected in 2009/10 (www.sms4science.ch), we test predictions put forward by two approaches to argument drop in abbreviated registers, i.e. the "Avoid Weak Start" hypothesis by Weir (2012a) and the "Truncated CP hypothesis" by
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Dropped messages"

1

Auckland, R. G. Messages from the sky over Britain: The fascinating story of the publicity and propaganda leaflets disseminated over Great Britain by airship, aeroplane, balloon and rocket, in peacetime and in war. Psywar Society, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Dropped messages"

1

Cohen, Jeffrey Jerome, and Allan Mitchell. "Oceanic Dispatches." In Oceanic New York. punctum books, 2015. https://doi.org/10.21983/p3.0112.1.20.

Full text
Abstract:
Iam landlocked anddreaming of the sea.Born near the coast, companioned by storms and swells, I’ve grown weary of summer thundershowers, puddles, brooks that purl, the mud under gutters, water without brine. I miss the ocean’s tang, touch and din. The Atlantic has a language even cloudbursts cannot translate. Not knowing how else to capture something marine, this morning I added sea salt to a milk glass and filled it from the tap. Into my kitchen sea I dropped a stone and scallop shell. Speckled granite plaything of the waves, the rock is round like an egg. I am guessing that breakers rolled it
APA, Harvard, Vancouver, ISO, and other styles
2

"Biblical Research, Critical Thinking, and 18 Pillars of Christianity." In Advances in Religious and Cultural Studies. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-5452-4.ch002.

Full text
Abstract:
In this chapter, the central themes or “pillars” of the Christian paradigm are grouped into three categories: (1) those that were central to the message of Jesus's preaching, (2) those that derived from the experiences of his closest disciples, and (3) those that represent Christological stances that are argued to be unwarranted or unnecessary. Then, each of the pillars in the first category (central to his messages) are described and critiqued in turn. The goal is to see which should be retained as is, which need to be revised, and which should be dropped. The chapter ends with the conclusion
APA, Harvard, Vancouver, ISO, and other styles
3

"Ferreting Out Silences and Invisibilities in Electronic Hive Minds." In Advances in Social Networking and Online Communities. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-9369-0.ch002.

Full text
Abstract:
An electronic hive mind (EHM), as a distributed swarm intelligence, is about shared information and resources and the interactions around those elements. A lesser-studied aspect in such electronic-enabled collectives involves unshared information, silences, withholdings, and other invisibilities. What is shared depends on socio-technical systems and how people engage and think socially, and these factors result in various absences, latencies, and shadowing of messaging. Here, an early mechanism-based approach is taken to understand the inflows and outflows of information from an EHM and areas
APA, Harvard, Vancouver, ISO, and other styles
4

Chantrapornchai, Chantana, and Jitdumrong Preechasuk. "Exploring Image and Video Steganography Based on DCT and Wavelet Transform." In Advanced Image Processing Techniques and Applications. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2053-5.ch003.

Full text
Abstract:
Steganography is one of the techniques used to communicate secret data through the cover media such as images, videos, audio, texts etc. In this work, we consider the algorithms of steganography based on DCT and wavelet transform. The aspects of media quality after hiding the information in the digital media are considered. Particularly, we compare the performance of the prototype algorithms, representing the DCT and wavelet-based image steganography algorithms respectively, using the PSNR, capacity, robustness and accuracy aspects. For video steganography, with various wavelet transforms, we
APA, Harvard, Vancouver, ISO, and other styles
5

Copeland, Jack. "Introduction." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0006.

Full text
Abstract:
The story of the Enigma cipher machine and its defeat by the Bletchley Park codebreakers astounded the world. This book describes Bletchley’s success against a later and more advanced German cipher machine that the British codenamed Tunny (see photograph 28). How Bletchley Park broke Tunny has been a closely guarded secret since the end of the war. Unlike Enigma, which dated from 1923 and was marketed openly throughout Europe, the ultra-secret Tunny was created by scientists of Hitler’s Third Reich for use by the German Wehrmacht. Tunny was technologically more sophisticated than Enigma and—th
APA, Harvard, Vancouver, ISO, and other styles
6

Roberts, Jerry. "The Testery: breaking Hitler’s most secret code." In The Turing Guide. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198747826.003.0024.

Full text
Abstract:
I joined the Intelligence Corps in autumn 1941. At that time few people were allowed into the Mansion at Bletchley Park, the nerve centre. I was fortunate enough to work in the Mansion and was one of the four founder members of the Testery, set up in October 1941 to break ‘Double Playfair’ cipher messages. Then in July 1942 the Testery was switched to breaking Tunny traffic. Before reminiscing about the breaking of the Tunny code I should like to recall Alan Turing himself. If it had not been for him everything would have been very different, and I am eternally grateful to him that I did not h
APA, Harvard, Vancouver, ISO, and other styles
7

Daniel, Larry J. "Cleburne, Blacks, and the Politics of Race." In Conquered. University of North Carolina Press, 2019. http://dx.doi.org/10.5149/northcarolina/9781469649504.003.0019.

Full text
Abstract:
Many Confederates believed the Emancipation Proclamation was a folly and would jeopardize the unity of the Union. Hundreds of African Americans worked as personal body servants in the Army of Tennessee. On December 17, 1803, 32 officers sent a petition drafted by Hardee to Richmond asking to expand the draft age to include 15 to 60-year-olds and have all able-bodied African Americans be placed in supportive, non-combatant roles. This petition was denied. Cleburne then suggested African Americans be armed, trained, and placed in ranks in exchange for freedom. He believed this would undercut the
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dropped messages"

1

Yang, Yaqin, Yalin Liu, and Nianwen Xue. "Recovering dropped pronouns from Chinese text messages." In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers). Association for Computational Linguistics, 2015. http://dx.doi.org/10.3115/v1/p15-2051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guo, Yun, Yuki Ishiwatari, Satoshi Ikejiri, and Yoshiaki Oka. "Parallel Computation for Particle-Grid Hybrid Method." In ASME 2010 3rd Joint US-European Fluids Engineering Summer Meeting collocated with 8th International Conference on Nanochannels, Microchannels, and Minichannels. ASMEDC, 2010. http://dx.doi.org/10.1115/fedsm-icnmm2010-30117.

Full text
Abstract:
In this paper, parallel computational technology is used in the numerical analysis code of particle-grid hybrid method. Particle-grid hybrid method is a rising solution method to analyze two-phase flow problem. It has shown its ability in several two-dimensional simulations. However, when this method was used to predict the droplet entrainment ratio of annulus flow the calculation time was insufferable. When the droplet occurs in the gas core, the density field varying near the droplet is strenuous. The pressure correction equations are very hard to be convergence. Hence, the MPI (Message Pass
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!