Academic literature on the topic 'Enid Twp'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Enid Twp.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Enid Twp"
Cui, Yong, Lian Wang, Xin Wang, Yisen Wang, Fengyuan Ren, and Shutao Xia. "End-to-end coding for TCP." IEEE Network 30, no. 2 (March 2016): 68–73. http://dx.doi.org/10.1109/mnet.2016.7437027.
Full textLorber, Gideon, Mordechai Duvdevani, and Ofer N. Gofrit. "Transected Guidewire Tip Simulating Ureteral Stone." Journal of Endourology 22, no. 4 (April 2008): 661–62. http://dx.doi.org/10.1089/end.2007.0348.
Full textCai, Chunlei, Li Chen, Xiaoyun Zhang, and Zhiyong Gao. "End-to-End Optimized ROI Image Compression." IEEE Transactions on Image Processing 29 (2020): 3442–57. http://dx.doi.org/10.1109/tip.2019.2960869.
Full textPERLMUTTER, AARON P., and JOSEPH N. MACALUSO. "Gold-Tip Laser Sleeve for a Bare Fiber." Journal of Endourology 9, no. 2 (April 1995): 137–40. http://dx.doi.org/10.1089/end.1995.9.137.
Full textMues, Adam C., Joel M. H. Teichman, and Bodo E. Knudsen. "Quantification of Holmium:Yttrium Aluminum Garnet Optical Tip Degradation." Journal of Endourology 23, no. 9 (September 2009): 1425–28. http://dx.doi.org/10.1089/end.2009.0384.
Full textCarlos, Evan C., Jingqiu Li, Brian J. Young, Daniela Radvak, Daniel A. Wollin, Brenton B. Winship, Walter Neal Simmons, Glenn M. Preminger, and Michael E. Lipkin. "Let's Get to the Point: Comparing Insertion Characteristics and Scope Damage of Flat-Tip and Ball-Tip Holmium Laser Fibers." Journal of Endourology 33, no. 1 (January 2019): 22–26. http://dx.doi.org/10.1089/end.2018.0229.
Full textMeyers, Stephen L., Katherine M. Jennings, and David W. Monks. "‘Covington' Sweetpotato Tolerance to Flumioxazin Applied POST-Directed." Weed Technology 28, no. 1 (March 2014): 163–67. http://dx.doi.org/10.1614/wt-d-13-00092.1.
Full textChaaban, Anas, and Aydin Sezgin. "Multi-Hop Relaying: An End-to-End Delay Analysis." IEEE Transactions on Wireless Communications 15, no. 4 (April 2016): 2552–61. http://dx.doi.org/10.1109/twc.2015.2504528.
Full textLiu, Chongyu, Yuliang Liu, Lianwen Jin, Shuaitao Zhang, Canjie Luo, and Yongpan Wang. "EraseNet: End-to-End Text Removal in the Wild." IEEE Transactions on Image Processing 29 (2020): 8760–75. http://dx.doi.org/10.1109/tip.2020.3018859.
Full textWang, Ning, Wengang Zhou, and Houqiang Li. "Learning Diverse Models for End-to-End Ensemble Tracking." IEEE Transactions on Image Processing 30 (2021): 2220–31. http://dx.doi.org/10.1109/tip.2021.3051471.
Full textDissertations / Theses on the topic "Enid Twp"
BONAM, VEERA VENKATA SIVARAMAKRISHNA. "Multipath TCP and Measuring end-to-end TCP Throughput : Multipath TCP Descriptions and Ways to Improve TCP Performance." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17075.
Full textAfifi, Mohammed Ahmed Melegy Mohammed. "TCP FTAT (Fast Transmit Adaptive Transmission): A New End-To- End Congestion Control Algorithm." Cleveland State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=csu1414689425.
Full textSANA, VINEESHA. "Multipath TCP and Measuring endto-end TCP Throughput : Measuring TCP Metrics and ways to improve TCP Throughput performance." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17098.
Full textPrasad, Ravi S. "An evolutionary approach to improve end-to-end performance in TCP/IP networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22543.
Full textIn network paths with significant available bandwidth, increasing the TCP window till observing loss can result in much lower throughput than the path's available bandwidth. We show that changes in TCP are {em not required} to utilize all the available bandwidth, and propose the application-layer SOcket Buffer Auto-Sizing (SOBAS) mechanism to achieve this goal. SOBAS relies on run-time estimation of the round trip time (RTT) and receive rate, and limits its socket buffer size when the receive rate approaches the path's available bandwidth. In a congested network, SOBAS does not limit its socket buffer size. Our experiment results show that SOBAS improves TCP throughput in uncongested network without hurting TCP performance in congested networks.
Improper router buffer sizing can also result in poor TCP throughput. Previous research in router buffer sizing focused on network performance metrics such as link utilization or loss rate. Instead, we focus on the impact of buffer sizing on end-to-end TCP performance. We find that the router buffer size that optimizes TCP throughput is largely determined by the link's output to input capacity ratio. If that ratio is larger than one, the loss rate drops exponentially with the buffer size and the optimal buffer size is close to zero. Otherwise, if the output to input capacity ratio is lower than one, the loss rate follows a power-law reduction with the buffer size and significant buffering is needed. The amount of buffering required in this case depends on whether most flows end in the slow-start phase or in the congestion avoidance phase.
TCP throughput also depends on whether the cross-traffic reduces its send rate upon congestion. We define this cross-traffic property as {em congestion responsiveness}. Since the majority of Internet traffic uses TCP, which reduces its send rate upon congestion, an aggregate of many TCP flows is believed to be congestion responsive. Here, we show that the congestion responsiveness of aggregate traffic also depends on the flow arrival process. If the flow arrival process follows an open-loop model, then even if the traffic consists exclusively of TCP transfers, the aggregate traffic can still be unresponsive to congestion. TCP flows that arrive in the network in a closed-loop manner are always congestion responsive, on the other hand. We also propose a scheme to estimate the fraction of traffic that follows the closed-loop model in a given link, and give practical guidelines to increase that fraction with simple application-layer modifications.
Cho, Sung Rae. "An end-to-end freeze TCP for ad-hoc networks." Thesis, University of Canterbury. Electrical Engineering, 2004. http://hdl.handle.net/10092/9606.
Full textWu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.
Full textMutagahywa, Eric Beda. "Socketless TCP : a connection identification philosophy for end to end mobility." Master's thesis, University of Cape Town, 2006. http://hdl.handle.net/11427/5147.
Full textThere is increasing pressure on Telecoms and Internet Service Providers to supply their customers with access to their customized services anywhere, on any terminal via any access technology. The pressure is trickled down to software programmers to provide innovative and advanced applications to fit this new environment. This will require network protocol architects to provide an Internet framework that will give programmers more control and flexibility to create mobile aware applications. To fulfill such requirements, network protocol architects need to shift their mobility perspective from the mobile terminal to a finer grained model; finely grained in respect to allowing individual transport connections to seamless switch between network terminals, controlled dynamically and/or manually by applications or users. The key issue of this vision is how to support this model in TCP/IP networks. We argue that the TCP/IP socket pair connection identification model restricts this granularity and flexibility of mobility. We present Socketless TCP (SL-TCP), an architectural concept based on reconsidering the socket pair for connection identification.
Portelli, Rebecca. "CheesePi: Delay Characterization through TCP-based Analysis from End-to-End Monitoring." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194244.
Full textMed ökande tillgång till den sammankopplade IP-nätet, krävs det en snabbare responstid från Internettjänster. Trafik från surfning, den näst mest populära tjänsten är särskilt tidskänsliga. Detta kräver tillförlitlighet och en garanti för data leverans med en god servicekvalitet från Internetleverantörer. Dessutom har de flesta av befolkningen inte den tekniska bakgrunden för att övervaka fördröjning sig från sina hemmanätverk, och deras Internetleverantörer har ingen utsiktspunkt för att övervaka och diagnostisera nätverksproblem från användarnas perspektiv. Därför syftet med denna forskning är att karakterisera “in-protokoll” fördöljingen i nätet, som påträffas under surfning inifrån ett LAN. Denna forskning visar TCP-trafik monitoring som utförs på en klientenhet, samt separat TCP-trafik monitoring över både klient-end och serve-end enheter, för att observera en automatiserad webbklient / server-kommunikation. Detta följs av offline analys av de infångade tracer där varje TCP flöde dissekerades in: handskakning, dataöverföring, och nedkoppling faser. Syftet bakom sådan utvinning är att möjliggöra karakterisering av nätverk fördröjning samt nätverkets fysiska fördröjning, behandlingsfördröjning, webböverföringsfördröjning och förlorade paket som uppfattas av end-device under dataöverföring. The outcome of measuring from both end devices showed that monitoring from both ends of a client/server communication results to a more accurate measurement of the genuine delay encountered when packets traverse the network than when measuring from the client-end only. Primarily, this was concluded through the ability to distinguish between the pure network delay and the kernel processing delay experienced during the TCP handshake and teardown. Secondly, it was confirmed that the two RTTs identified in a TCP handshake are not symmetrical and that a TCP teardown RTT takes longer than the TCP handshake RTT within the same TCP flow since a server must take measures to avoid SYN flooding attacks. Thirdly, by monitoring from both end devices, it was possible to identify routing path asymmetries by calculating the physical one-way delay a packet using the forward path in comparison to the physical delay of a packet using the reverse path. Lastly, by monitoring from both end devices, it is possible to distinguish between a packet that was actually lost and a packet that arrived with a higher delay than its subsequent packet during data transfer. Furthermore, utilizing TCP flows to measure the RTT delay excluding end host processing gave a better characterisation of the RTT delay as opposed to using ICMP traffic. Resultatet av mätningarna från både slut-enheter visar att övervakning från båda ändar av en klient / server-kommunikation resulterar en noggrannare mätning av fördröjningar som uppstår när paketen färdas över nätverket än vid mätning från den enda klienten. Främst avslutades detta genom förmågan att skilja mellan den rena nätfördröjningen och kernel bearbetning under TCP handskakning och nedkoppling. För det andra bekräftades att de två RTT som identifierats i en TCP handskakning inte är symmetriska och att TCP nedkoppling RTT är längre än TCP handskakning RTT inom samma TCP flödet, eftersom servern måste vidta åtgärder för att undvika SYN översvämning attacker. För det tredje, genom att övervaka från båda avancerade enheter, var det möjligt att identifiera path asymmetrier genom att beräkna den fysiska envägsfördröjningen av ett paket på framåtriktade banan i jämförelse med den fysiska fördröjningen för ett paket på den omvända banan. Slutligen genom att övervaka från båda end enheter, är det möjligt att skilja mellan ett paket som faktiskt förlorades och ett paket som kom med en högre fördröjning än dess efterföljande paket under dataöverföring. Dessutom utnyttjande av TCP flöden för att mäta RTT exkluderat end-nod porocessering gav en bättre karakterisering av RTT fördröjning jämfört med att ICMP-trafik.
Lau, Chee Kong Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Improving mobile IP handover latency on end-to -end TCP in UMTS/WCDMA networks." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/22806.
Full textCraven, Ryan M. "Design and evaluation for the end-to-end detection of TCP/IP header manipulation." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42602.
Full textUnderstanding, measuring, and debugging IP networks, particularly across administrative domains, is challenging. One aspect of the challenge are transparent middleboxes, which are now common in today’s Internet. In-path middleboxes that modify packet headers are typically transparent to a TCP, yet can impact the end-to-end performance of its connections. Of equal importance, middleboxes cause architectural ossification that hinders network protocol evolution—new options or redefined header fields are often misconstrued, modified, or disabled. We develop TCP HICCUPS to reveal packet header manipulation to both endpoints of a TCP connection. HICCUPS adds a lightweight tamper-evident seal to TCP that is incrementally deployable and introduces no new options. HICCUPS provides an optional feature, AppSalt, that allows applications to request added protection for their connection’s integrity, making it more difficult for middleboxes to falsify integrity values. HICCUPS is implemented in both an operating system patch to the Linux TCP stack as well as a set of cross-platform user-space tools. To evaluate HICCUPS, we deploy it to a diverse set of Internet nodes spread across 197 networks and 48 countries, measuring packet header manipulations on over 26 thousand directed port/path pairs. We discover over 11 thousand instances of unique non-NAT in-path packet header modifications across those flows, all with the potential to negatively affect TCP performance.
Books on the topic "Enid Twp"
Michael, Stott, ed. Birds of Australia's Top End. Parap, N.T: Scrubfowl Press, 2001.
Find full textDarts beginning to end: American, softer-tip & steel tip. [Bloomington, Ind.?]: Xlibris, 2009.
Find full textBook chapters on the topic "Enid Twp"
Fulbrook, Mary. "The End of Two Germanies." In The Two Germanies, 1945–1990, 77–88. London: Macmillan Education UK, 1992. http://dx.doi.org/10.1007/978-1-349-12134-2_6.
Full textFulbrook, Mary. "The End of the Two Germanies." In Interpretations of the Two Germanies, 77–88. London: Macmillan Education UK, 2000. http://dx.doi.org/10.1007/978-1-4039-1937-3_6.
Full textAnderson, Seth C., and Jeffery A. Born. "Content Summaries of Volumes One and Two." In Closed-End Fund Pricing, 11–16. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4757-3633-5_3.
Full textGass, William. "Stuttgart Lecture Two: Form." In The End of Postmodernism: New Directions, 101–14. Stuttgart: J.B. Metzler, 1993. http://dx.doi.org/10.1007/978-3-476-04202-6_7.
Full textKojève, Alexandre. "Part Two. After the End." In Knowing and History, 81–146. Ithaca, NY: Cornell University Press, 2019. http://dx.doi.org/10.7591/9781501743214-005.
Full textKierkegaard, Patrick, and Panos Markopoulos. "From Top to Bottom: End User Development, Motivation, Creativity and Organisational Support." In End-User Development, 307–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21530-8_31.
Full textPaulmann, Johannes. "Beginning and End? The Two German Unifications and the Epoch of Territoriality." In Germany's Two Unifications, 26–48. London: Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230518520_2.
Full textMartin, Jim, and Arne Nilsson. "On End-to-End Congestion Avoidance for TCP/IP." In High Performance Networking, 535–51. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35388-3_32.
Full textJarecki, Stanislaw, Hugo Krawczyk, Maliheh Shirvanian, and Nitesh Saxena. "Two-Factor Authentication with End-to-End Password Security." In Public-Key Cryptography – PKC 2018, 431–61. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76581-5_15.
Full textHaider, Aun, Harsha Sirisena, and Krzysztof Pawlikowski. "Interaction between TCP Reno and TCP Vegas in End-to-End Congestion Control." In Lecture Notes in Computer Science, 321–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25978-7_33.
Full textConference papers on the topic "Enid Twp"
Marcondes, Cesar, M. Y. Sanadidi, Mario Gerla, Magnos Martinello, and Ramon S. Schwartz. "Exploring Embedded Path Capacity Estimation in TCP Receiver." In Fifth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, E2EMON'07. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375311.
Full textLorkiewicz, Wojciech. "Issues on Two-Layer Object Perception in the Process of Artificial Semiosis." In 2016 Third European Network Intelligence Conference (ENIC). IEEE, 2016. http://dx.doi.org/10.1109/enic.2016.032.
Full textKfoury, Elie F., and David J. Khoury. "Secure End-to-End VoLTE Based on Ethereum Blockchain." In 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2018. http://dx.doi.org/10.1109/tsp.2018.8441204.
Full textRoseti, Cesare, Ahmed Abdel Salam, Michele Luglio, and Francesco Zampognaro. "SPDY over satellite: Performance optimization through an end-to-end technology." In 2015 38th International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2015. http://dx.doi.org/10.1109/tsp.2015.7296430.
Full textBiester, Marc H. O., Dimitri Karapetrow, and Joerg R. Seume. "Effect of the Tip Clearance on End Wall Heat-Transfer in a HP Turbine." In ASME 2013 Turbine Blade Tip Symposium. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/tbts2013-2069.
Full textSainath, Tara N., Ruoming Pang, David Rybach, Yanzhang He, Rohit Prabhavalkar, Wei Li, Mirkó Visontai, et al. "Two-Pass End-to-End Speech Recognition." In Interspeech 2019. ISCA: ISCA, 2019. http://dx.doi.org/10.21437/interspeech.2019-1341.
Full textXie, Fei, Ning Jiang, Yao Hua Ho, and Kien A. Hua. "Semi-Split TCP: Maintaining End-to-End Semantics for Split TCP." In 32nd IEEE Conference on Local Computer Networks (LCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/lcn.2007.139.
Full textZhang, Q., L. He, and A. Rawlinson. "Effects of Inlet Turbulence and End-Wall Boundary Layer on Aero-Thermal Performance of a Transonic Turbine Blade Tip." In ASME 2013 Turbine Blade Tip Symposium. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/tbts2013-2019.
Full textSpinelli, Carlo Maria, and Furio Marchersani. "TAP Project." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0017.
Full textHonda, Osamu, Hiroyuki Ohsaki, Makoto Imase, Mika Ishizuka, and Junichi Murayama. "Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency." In Optics East 2005, edited by Mohammed Atiquzzaman and Sergey I. Balandin. SPIE, 2005. http://dx.doi.org/10.1117/12.630496.
Full textReports on the topic "Enid Twp"
Forrest, R. N. Two Random Tour Processes of Known Length between Known End Points. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada239360.
Full textBlack, Kevin. Exotic Physics with the Top Quark at the LHC. End of grant report. Office of Scientific and Technical Information (OSTI), July 2013. http://dx.doi.org/10.2172/1088779.
Full textArmstrong, P. R., and J. M. Keller. Energy end-use metering in two modular office buildings at Fort Irwin, California. Office of Scientific and Technical Information (OSTI), January 1994. http://dx.doi.org/10.2172/10124644.
Full textTimms, Leo L., and Joe Morelli. Teat End and Skin Conditioning Evaluation of Two Experimental Heptanoic Acid Teat Dips During Winter. Ames (Iowa): Iowa State University, January 2008. http://dx.doi.org/10.31274/ans_air-180814-734.
Full textHarrison, William R. The End of the Cold War: Its Impact on International News Coverage in Two U.S. Newspapers. Fort Belvoir, VA: Defense Technical Information Center, May 1998. http://dx.doi.org/10.21236/ada354210.
Full textJob, P. K., R. Popescu, and Z. Xia. Radiological Consequences of Beam Loss on Beamline Front End Collimator during Top-off Injection into the Storage Ring. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1493224.
Full textBibler, J. P. Year-end report for UST: Cesium extraction testing project DOE/DT&E TTP No. SR1-03-20-01. Office of Scientific and Technical Information (OSTI), February 1994. http://dx.doi.org/10.2172/10139018.
Full textShu, D., T. Sanchez, and T. Kuzay. An integrated bremsstrahlung safety shutter and collimator designed for the APS front end operating in the top-up mode. Office of Scientific and Technical Information (OSTI), April 1992. http://dx.doi.org/10.2172/97103.
Full textXia, Zhenghua. Radiological Consequences of Beam Loss at Front End by FLUKA during Top-off Injection into the Storage Ring for PROJECT Beamlines. Office of Scientific and Technical Information (OSTI), November 2014. http://dx.doi.org/10.2172/1493226.
Full textBarickman, Philip W., and Jerry W. Beaver. Transportability Testing of the Joint Direct Attack Munition (JDAM) in an End-Opening Container, TP-94-01, Transportability Testing Procedures"". Fort Belvoir, VA: Defense Technical Information Center, January 2004. http://dx.doi.org/10.21236/ada421237.
Full text