Academic literature on the topic 'Duplicate acks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Duplicate acks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Duplicate acks"

1

Colot, V., and J. L. Rossignol. "Isolation of the Ascobolus immersus spore color gene b2 and study in single cells of gene silencing by methylation induced premeiotically." Genetics 141, no. 4 (1995): 1299–314. http://dx.doi.org/10.1093/genetics/141.4.1299.

Full text
Abstract:
Abstract The ascomycete Ascobolus immersus has been extensively used as a model system for the genetic study of meiotic recombination. More recently, an epigenetic process, known as methylation induced premeiotically (MIP), that acts on duplicated sequences has been discovered in A. immersus and has raised a new interest in this fungus. To try and extend these studies, we have now cloned the A. immersus spore color gene b2, a well characterized recombination hot-spot. Isolation of the whole gene was verified by physical mapping of four large b2 alterations, followed by transformation and mutan
APA, Harvard, Vancouver, ISO, and other styles
2

Havird, Justin C., and Hunter J. McConie. "Sexually Antagonistic Mitonuclear Coevolution in Duplicate Oxidative Phosphorylation Genes." Integrative and Comparative Biology 59, no. 4 (2019): 864–74. http://dx.doi.org/10.1093/icb/icz021.

Full text
Abstract:
Abstract Mitochondrial function is critical in eukaryotes. To maintain an adequate supply of energy, precise interactions must be maintained between nuclear- and mitochondrial-encoded gene products. Such interactions are paramount in chimeric enzymes such as the oxidative phosphorylation (OXPHOS) complexes. Mutualistic coevolution between the two genomes has therefore been suggested to be a critical, ubiquitous feature of eukaryotes that acts to maintain cellular function. However, mitochondrial genomes can also act selfishly and increase their own transmission at the expense of organismal fun
APA, Harvard, Vancouver, ISO, and other styles
3

Dávila-Martínez, Yadira, Ana Laura Ramos-Vega, Sandra Contreras-Martínez, Sergio Encarnación, Otto Geiger, and Isabel M. López-Lara. "SMc01553 is the sixth acyl carrier protein in Sinorhizobium meliloti 1021." Microbiology 156, no. 1 (2010): 230–39. http://dx.doi.org/10.1099/mic.0.033480-0.

Full text
Abstract:
Acyl carrier proteins (ACPs) are required for the transfer of acyl intermediates during fatty acid and polyketide syntheses. In Sinorhizobium meliloti 1021 there are five known ACPs: AcpP, NodF, AcpXL, the ACP domain in RkpA and SMb20651. The genome sequence of S. meliloti 1021 also reveals the ORF SMc01553, annotated as a putative ACP. smc01553 is part of a 6.6 kb DNA region that is duplicated in the chromosome and in the pSymb plasmid, the result of a recent duplication event. SMc01553 overexpressed in Escherichia coli was labelled in vivo with [3H]β-alanine, a biosynthetic building block of
APA, Harvard, Vancouver, ISO, and other styles
4

Borges, Sofia, Pedro Cravo, Alison Creasey, et al. "Genomewide Scan Reveals Amplification ofmdr1as a Common Denominator of Resistance to Mefloquine, Lumefantrine, and Artemisinin in Plasmodium chabaudi Malaria Parasites." Antimicrobial Agents and Chemotherapy 55, no. 10 (2011): 4858–65. http://dx.doi.org/10.1128/aac.01748-10.

Full text
Abstract:
ABSTRACTMultidrug-resistantPlasmodium falciparummalaria parasites pose a threat to effective drug control, even to artemisinin-based combination therapies (ACTs). Here we used linkage group selection and Solexa whole-genome resequencing to investigate the genetic basis of resistance to component drugs of ACTs. Using the rodent malaria parasiteP. chabaudi, we analyzed the uncloned progeny of a genetic backcross between the mefloquine-, lumefantrine-, and artemisinin-resistant mutant AS-15MF and a genetically distinct sensitive clone, AJ, following drug treatment. Genomewide scans of selection s
APA, Harvard, Vancouver, ISO, and other styles
5

Buratovich, Michael A., and Peter J. Bryant. "Enhancement of Overgrowth by Gene Interactions in lethal(2)giant discs Imaginal Discs From Drosophila melanogaster." Genetics 147, no. 2 (1997): 657–70. http://dx.doi.org/10.1093/genetics/147.2.657.

Full text
Abstract:
Recessive lethal mutations of the lethal(2)giant discs (l(2)gd) and lethal(2)fat (l(2)ft) loci of Drosophila melanogaster cause imaginal disc hyperplasia during a prolonged larval stage. Imaginal discs from l(2)ft l(2)gd or G l(2)gd double homozygotes show more extensive overgrowth than in either single homozygote, and double homozygous l(2)ft l(2)gd mitotic clones in adult flies show much more overgrowth than is seen in clones homozygous for either l(2)gd or l(2)ft alone. dachsous (ds) also acts as an enhancer of l(2)gd, producing dramatically overgrown discs and causing failure to pupariate
APA, Harvard, Vancouver, ISO, and other styles
6

Meilus, M., and MAA Castro-Prado. "Gene inactivation system extension into a unique sequence outside of the II →> I insertional duplication in Aspergillus nidulans." Canadian Journal of Microbiology 44, no. 11 (1998): 1037–44. http://dx.doi.org/10.1139/w98-099.

Full text
Abstract:
The first report of the gene inactivation system (GIS) in Aspergillus nidulans came from crosses involving a II Gene inactivation system extension into a unique sequence outside of the II →> I insertional duplication. Duplicated segments trigger the GIS that acts through the methylation of cytosines present within repeats. Duplicated genes are probably inactivated during the premeiotic period between fertilization and karyogamy, but reactivation may occur spontaneously or after 5-azacytidine treatment. The aim of the present study was to determine the action of GIS on a single copy gene loc
APA, Harvard, Vancouver, ISO, and other styles
7

Angeliqa, Fitria, and Billy K. Sarwono. "Symbolic violence and the effort to silencing women in their positions as leaders (critics of the women leaders’ habitus in advertising agencies)." E3S Web of Conferences 74 (2018): 10015. http://dx.doi.org/10.1051/e3sconf/20187410015.

Full text
Abstract:
The objective of this study perceives how the advertising agencies assign women to the position of the company leader as a patriarchal effort (as "the right hand" of the capitalists) to “muted” women in "comfortable" place. This research applies Pierre Bourdieu's Habitus-Field-Capital theory and its implications in the form of symbolic violence. This descriptive research applies constructivism paradigm. Obtained by conducting in-depth interviews with women leaders of advertising agencies, the data are examined using hermeneutic phenomenology. As a result, it becomes more and more difficult for
APA, Harvard, Vancouver, ISO, and other styles
8

Douglas, Max E., and John F. X. Diffley. "Budding yeast Rap1, but not telomeric DNA, is inhibitory for multiple stages of DNA replication in vitro." Nucleic Acids Research 49, no. 10 (2021): 5671–83. http://dx.doi.org/10.1093/nar/gkab416.

Full text
Abstract:
Abstract Telomeres are copied and reassembled each cell division cycle through a multistep process called telomere replication. Most telomeric DNA is duplicated semiconservatively during this process, but replication forks frequently pause or stall at telomeres in yeast, mouse and human cells, potentially causing chronic telomere shortening or loss in a single cell cycle. We have investigated the cause of this effect by examining the replication of telomeric templates in vitro. Using a reconstituted assay for eukaryotic DNA replication in which a complete eukaryotic replisome is assembled and
APA, Harvard, Vancouver, ISO, and other styles
9

Ballou, Elizabeth Ripley, Lukasz Kozubowski, Connie B. Nichols, and J. Andrew Alspaugh. "Ras1 Acts through Duplicated Cdc42 and Rac Proteins to Regulate Morphogenesis and Pathogenesis in the Human Fungal Pathogen Cryptococcus neoformans." PLoS Genetics 9, no. 8 (2013): e1003687. http://dx.doi.org/10.1371/journal.pgen.1003687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dhakal, Rebat Kumar. "Responsible Practice of Research: Safeguarding Research Integrity and Publication Ethics." Journal of Education and Research 6, no. 2 (2018): 1–11. http://dx.doi.org/10.3126/jer.v6i2.22144.

Full text
Abstract:
In recent years, there has been an outburst of general interest on how we do ‘research’ (Bossi 2010; Lins & Carvalho, 2014) – right from planning to reporting results – and how we disseminate ‘knowledge’. This rise of interest has particularly resulted from the surfeit of news on dishonest practices of research community. Some of the ‘acts of wrongdoing’ or fraudulent research practices that arise in our academic debate comprise the cases such as creation of false data or manipulating data to generate preferred results, cheating or using other’s ideas as own, disclosing improperly the iden
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Duplicate acks"

1

Francis, Breeson. "Enhancing TCP Congestion Control for Improved Performance in Wireless Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23254.

Full text
Abstract:
Transmission Control Protocol (TCP) designed to deliver seamless and reliable end-to-end data transfer across unreliable networks works impeccably well in wired environment. In fact, TCP carries the around 90% of Internet traffic, so performance of Internet is largely based on the performance of TCP. However, end-to-end throughput in TCP degrades notably when operated in wireless networks. In wireless networks, due to high bit error rate and changing level of congestion, retransmission timeouts for packets lost in transmission is unavoidable. TCP misinterprets these random packet losses, due t
APA, Harvard, Vancouver, ISO, and other styles
2

Bansal, Dushyant. "Third-Party TCP Rate Control." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/803.

Full text
Abstract:
The Transmission Control Protocol (TCP) is the dominant transport protocol in today?s Internet. The original design of TCP left congestion control open to future designers. Short of implementing changes to the TCP stack on the end-nodes themselves, Internet Service Providers have employed several techniques to be able to operate their network equipment efficiently. These techniques amount to shaping traffic to reduce cost and improve overall customer satisfaction. <br /><br /> The method that gives maximum control when performing traffic shaping is using an inline traffic shaper. A
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Duplicate acks"

1

Gómez, Pablo F. "Astounding Creativity." In Experiential Caribbean. University of North Carolina Press, 2017. http://dx.doi.org/10.5149/northcarolina/9781469630878.003.0007.

Full text
Abstract:
This chapter explores black Caribbean ritual practitioners’ use, classification, and production of wonders in the seventeenth century. The chapter argues that wondrous events established the foundation upon which black Caribbean experiential epistemologies about nature became cemented. The Caribbean’s baffling realities were anything but stable. The chapter shows how Caribbean ritual practitioners drew from their own traditions while creating new meanings with their awe-inspiring acts; they did not simply duplicate representations of preordained, episteme-bounded signifiers of Old World origin. Witnesses to black Caribbean ritual practitioners’ reality-creating rituals could not help but feel viscerally amazed when these men and women flayed open the skin of the world to reveal its mysteries. Their ability to astonishingly master nature imbued each ritual practitioner with the social capital necessary to validate his or her diagnoses, healing procedures, and preparations. The wondrous nature of Caribbean lands allowed black ritual practitioners to claim authority over material truths in a world where facts remained difficult to articulate formally within multicultural and transitional societies.
APA, Harvard, Vancouver, ISO, and other styles
2

Short, Courtney A. "Having a Say." In Uniquely Okinawan. Fordham University Press, 2020. http://dx.doi.org/10.5422/fordham/9780823288380.003.0006.

Full text
Abstract:
Under the chaotic and insufferable conditions of war, the Okinawans fled their homes and struggled for survival without food, water, or shelter. In their desperate travels, the Okinawans had numerous encounters with the Japanese military, sometimes seeking out the troops for protection. Most encounters, however, ended in violence and brutality. Shaken by the dissonance between the rhetoric of indoctrination and the acts of cruelty that demonstrated an abandonment of the preached ideals of shared nationhood, the Okinawans processed the duplicity of the Japanese by practically pursuing methods to ensure survival and by re-evaluating their own identity. The population began to question their commitment to Japan and their identity as Japanese subjects. The Okinawans actively reconstructed an identity to improve their situation. Through conscious process and interaction with both the Japanese and Americans, they came to a collective identity as Okinawan.
APA, Harvard, Vancouver, ISO, and other styles
3

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch008.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
4

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch001.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
5

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Digital Forensics and Forensic Investigations. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch018.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Duplicate acks"

1

Sato, Yurino, Hiroyuki Koga, Masayoshi Shimamura, and Takeshi Ikenaga. "Redundancy control and duplicate ACK suppression methods for TCP with FEC." In 2013 21st IEEE International Conference on Network Protocols (ICNP). IEEE, 2013. http://dx.doi.org/10.1109/icnp.2013.6733623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Janevski, Toni, and Ivan Petrov. "Analysis of the impact of Duplicated ACK on the performances of TCP." In 2011 19th Telecommunications Forum Telfor (TELFOR). IEEE, 2011. http://dx.doi.org/10.1109/telfor.2011.6143530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Obeid, Ahmad, Abdulrahman Takiddeen, and Andrzej Stefan Sluzek. "ICSAC: Towards Outliers Rejection and Multi-Model Identification in Keypoint-Based Matching of Partial Near-Duplicates." In 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2019. http://dx.doi.org/10.1109/aiccsa47632.2019.9035285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dongwook Lee and Jong Won Kim. "Delayed-duplicated ACK (DDA) algorithm for TCP performance enhancement to overcome packet sequence disruption in fast-handoff of Mobile IPv6." In 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings. IEEE, 2004. http://dx.doi.org/10.1109/icdcsw.2004.1284015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!