Academic literature on the topic 'Node behavior'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Node behavior.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Node behavior"

1

Fan, Na, Zongtao Duan, and Guangyuan Zhu. "A data dissemination mechanism based on evaluating behavior for vehicular delay-tolerant networks." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865509.

Full text
Abstract:
Vehicular delay-tolerant networks are widely used in intelligent transport application. Vehicle nodes exchange and share various information in vehicular delay-tolerant networks. However, current delay-tolerant network routing algorithms do not take into account the dynamic characteristic of traffic flow, and they do not effectively resist cyber attacks, such as black hole attack. To address this issue, we propose a data dissemination mechanism for vehicular delay-tolerant networks. In this mechanism, we develop a combined model to estimate the real-time traffic density. Simultaneously, we pro
APA, Harvard, Vancouver, ISO, and other styles
2

Forouzandeh, Saman, Amir Sheikhahmadi, Atae Rezaei Aghdam, and Shuxiang Xu. "New centrality measure for nodes based on user social status and behavior on Facebook." International Journal of Web Information Systems 14, no. 2 (2018): 158–76. http://dx.doi.org/10.1108/ijwis-07-2017-0053.

Full text
Abstract:
Purpose This paper aims to analyze the role of influential nodes on other users on Facebook social media sites by social and behavioral characteristics of users. Hence, a new centrality for user is defined, applying susceptible-infected recovered (SIR) model to identify influence of users. Results show that the combination of behavioral and social characteristics would be determined the most influential users that influence majority of nodes on social networks. Design/methodology/approach In this paper, the authors define a new centrality for users, considering node status and behaviors. Thus,
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Bo, Jian Lin Mao, Ning Guo, Guan Hua Qiao, and Ning Dai. "A Threshold-Based K-Means Algorithm for Selfish Behavior Detection in IEEE 802.15.4 Wireless Sensor Networks." Applied Mechanics and Materials 303-306 (February 2013): 255–60. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.255.

Full text
Abstract:
To overcome the insufficient of Sliding Window Non-parameter Cumulation Sum (SWN-CUSUM) algorithm, a Threshold-based K-means (TK-means) algorithm was presented to detect the selfish behaviors in an IEEE 802.15.4 Wireless Sensor Network (WSN).By judging the threshold and tracing the statistics characteristic of the average delay and the average throughput from each link, a node can determine if there is a selfish behavior and distinguish selfish nodes from normal nodes in the WSN. In the TK-means detection mechanism, when the threshold is lower than zero, it is judged that selfish behavior happ
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Qi. "Node Behavior Trust Evaluation Model Based on Sliding Window." Applied Mechanics and Materials 155-156 (February 2012): 138–42. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.138.

Full text
Abstract:
In order to improve confidence of the node behavior the credibility assessing, this paper presents the nodes behavior of the trust evaluation mechanism based on sliding window, Through the sliding window Assessment strategies to ensure the trust assessment to meet the node behavior assessment principles, Assessment strategies is good combination of confidence assessment method of the subjective and assessment content of the objectivity to ensure contacts number ofa large number of nodes (Nmin) at the same time maintaining good scalability, trust assessment reflects the importance of the recent
APA, Harvard, Vancouver, ISO, and other styles
5

Nian, Fuzhong, Yang Yang, Yayong Shi, Jinhu Ren, and Renmeng Cao. "A behavioral propagation and competition model based on pressure." Modern Physics Letters B 35, no. 19 (2021): 2150328. http://dx.doi.org/10.1142/s0217984921503280.

Full text
Abstract:
The influence of node behavior by the relevant group behavior in complex networks is a topic of recent interest. In order to measure the direct and indirect influence of the neighborhoods, the behavioral propagation and competition model was established based on the pressure. The pressure is described by the impact of group behavior on nodes, which is related to the length and number of reachable paths between two nodes for measuring the nodal behavioral influence. In addition, the pressure range has an effect on the pressure. By modeling and analyzing the change of nodes motivation and the ru
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Cui Ye, Cheng Lie Du, and Gang Li. "An Event Bridge Framework for Modeling and Simulating Networked Hybrid Dynamic Behaviors." Applied Mechanics and Materials 651-653 (September 2014): 1798–805. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1798.

Full text
Abstract:
Typical CPS system composes of large scale of smart physical nodes communicated by kinds of network, while each node shows certain hybrid dynamic behavior. Their dynamic behavior features with networked mix of discrete time-driven cyber behavior and continuous time-driven physical behavior, complicating the modeling and simulating of the entire CPS behavior during the design and analysis. In this paper, an event bridge framework is proposed, extending the composition semantics of the hybrid automata, to capture the communication relationship among CPS nodes as well as the transmission delay pr
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xian Jun. "Study on Gravity Dam Foundation Stability Combining with Dam Foundation Deformation Behavior." Advanced Materials Research 250-253 (May 2011): 2965–69. http://dx.doi.org/10.4028/www.scientific.net/amr.250-253.2965.

Full text
Abstract:
Gravity dam foundation failure progress is always associated with its deformation development. So dam foundation deformation should be paid more attention in gravity dam stability analysis. Key node plays an important role in analyzing the dam foundation deformation development. But how to select key node is worth researching. A gravity dam foundation stability is studied by the development of plastic zone and key nodes’ displacements in dam foundation. The problem of key node selection is researched and a key node selection method is brought up also in this paper.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Feng, Yali Si, Ning Lu, Zhen Chen, and Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.

Full text
Abstract:
Due to the unique network characteristics, the security and efficient routing in DTNs are considered as two great challenges. In this paper, we design a security and efficient routing scheme, called SER, which integrates the routing decision and the attacks detection mechanisms. In SER scheme, each DTNs node locally maintains a one-dimensional vector table to record the summary information about the contact with other nodes and the trust degree of other nodes. To obtain the global status and the contact relationship among all nodes, the trusted routing table consisting of vectors of all nodes
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Longbao, Yingchi Mao, Yangkun Cheng, and Yi Liu. "Deep Learning-Based Diagnosing Structural Behavior in Dam Safety Monitoring System." Sensors 21, no. 4 (2021): 1171. http://dx.doi.org/10.3390/s21041171.

Full text
Abstract:
Collecting a myriad of prototype data through various types of monitoring sensors plays a virtual important role in many aspects of dam safety such as real-time grasp of safety state, exposure of hidden dangers, and inspection design and construction. However, the current methods of prediction are weak in the long-term sequence of nodes with missing and abnormal error value. Moreover, the limitation caused by the apparatus, environmental factors, and network transmission can lead to the deviation and inconsistency of diagnosis and evaluation of local region. In this paper, we consider the corr
APA, Harvard, Vancouver, ISO, and other styles
10

S, Dhanabal, Dr Amudhavalli P, Dr Prasanna Venkatesan G. K. D, and Dr Prasanna Venkatesan G. K. D. "An energy efficient flexible delay tolerant network with adaptive secured framework (ASF-DTN)." International Journal of Engineering & Technology 7, no. 3 (2018): 1299. http://dx.doi.org/10.14419/ijet.v7i3.12485.

Full text
Abstract:
Delay tolerant networks are widely used in mobile communications because of network withstanding capability of delay. However, when the connectivity of nodes increases, data loss may occur while transmission. Due to the malicious behavior of nodes the data may get permanently lost, which is known as black hole attacks and there is a chance to partial data loss because of the lower energy level of a node, which is known as a gray hole attack. In existing work, the data capacity of a node is not limited, so most of the highly energy efficient node contains a huge amount of data, when compared to
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Node behavior"

1

Adelhelm, Christoph. "Structure and erosion behavior of metal-doped carbon films." kostenfrei, 2008. http://mediatum2.ub.tum.de/node?id=645118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rachapudi, Navya. "Impact of User Behavior on Resource Scaling in the XIFI Node." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10796.

Full text
Abstract:
Resource scaling improves the capability of a datacenter or group of datacenters collaborated together to provide resources at low cost in order to meet the demands and objectives of application services, but, it is substantial to determine the requirements of the user, especially in the large projects like XIFI. It is important to estimate the number of users, their arrival rate and types of applications that are often requested for resource allocation, to expand the resource dimensions to proportionate degree. In this study we frame a structure that provides deep insights to comprehend XIFI
APA, Harvard, Vancouver, ISO, and other styles
3

Rezaei, Nazanin. "Study on Strut and Node Behavior in Strut-and-Tie Modeling." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3749.

Full text
Abstract:
The strut-and-tie method (STM) is a simple and conservative method for designing concrete structures, especially deep beams. This method expresses complicated stress patterns as a simple truss or kinematic model made up of compression elements (struts), tension elements (ties), and the joints between elements (nodes). STM is based on lowerbound plasticity theorem, so using it properly will lead to a conservative design. Although the concepts of STM have been around in concrete design since the late 19th century, STM was first introduced in AASHTO LRFD in 1994 and ACI 318-02 in 2002. ACI 318 de
APA, Harvard, Vancouver, ISO, and other styles
4

Srivastava, Vivek. "Behavior-based Incentives for Node Cooperation in Wireless Ad Hoc Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/29172.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) adopts a decentralized communication architecture which relies on cooperation among nodes at each layer of the protocol stack. Its reliance on cooperation for success and survival makes the ad hoc network particularly sensitive to variations in node behavior. Specifically, for functions such as routing, nodes which are limited in their resources may be unwilling to cooperate in forwarding for other nodes. Such selfish behavior leads to degradation in the performance of the network and possibly, in the extreme case, a complete cessation of operations. Consequentl
APA, Harvard, Vancouver, ISO, and other styles
5

Worbs, Peter. "Wetting behavior of titanium carbide films for carbon-copper braze joints in high heat flux components." kostenfrei, 2009. http://mediatum2.ub.tum.de/node?id=823480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schmidt, Eric A. (Eric Alexander). "Node-Link Mapping and Rational Recovery: Enhancing the Recovery Process." Thesis, University of North Texas, 1997. https://digital.library.unt.edu/ark:/67531/metadc277722/.

Full text
Abstract:
Alcoholics Anonymous (AA) continues to be the most accepted approach for the treatment of addictions in the United States. However, due to recent evidence questioning the effectiveness of AA, the need for alternative approaches to the treatment of addictions has become clear. The following research addresses the efficacy of one such alternative, Rational Recovery (RR). Node-Link Mapping (NLM), a graphic communication technique which uses links and nodes as building blocs to facilitate and enhance communication of information as well as awareness in a counseling environment, was implemented to
APA, Harvard, Vancouver, ISO, and other styles
7

Charalampidis, Vasileios. "Real-Time Monitoring System of Sedentary Behavior with Android Wear and Cloud Computing : An office case study." Thesis, KTH, Skolan för teknik och hälsa (STH), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210017.

Full text
Abstract:
Nowadays, prolonged sitting among office workers is a widespread problem, which is highly related to several health problems. Many proposals have been reported and evaluated to address this issue. However, motivating and engaging workers to change health behavior to a healthier working life is still a challenge. In this project, a specific application has been deployed for real-time monitoring and alerting office workers for prolonged sitting. The proposed system consists of three distinct parts: The first one is an android smartwatch, which was used to collect sensor data e.g., accelerometer
APA, Harvard, Vancouver, ISO, and other styles
8

Södergren, Natasha. "Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-12823.

Full text
Abstract:
The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layo
APA, Harvard, Vancouver, ISO, and other styles
9

Pradyumna, M. "Influence Of Joint Compliance On The Behaviour Of Space Structures." Thesis, Indian Institute of Science, 2000. http://hdl.handle.net/2005/258.

Full text
Abstract:
Space structures are inevitable while covering large spans. Space structures are skeletal structures, which are lighter for the same stiffness when compared with RCC roofs. Till now, space structures, like any other metal structures have been designed assuming the joints as rigid, although there have been several publications about semi rigid joints. Of course, the publications mostly deal with 2D structures and there are very few reports on 3D structures. Space structures, by their nature fall into the latter category. The joints in a space structure are popularly called as "nodes". Generall
APA, Harvard, Vancouver, ISO, and other styles
10

Webb, Katharine Joy. "Molecular and cellular characterisation of neurogenesis control and addiction behaviour in zebrafish." kostenfrei, 2009. https://mediatum2.ub.tum.de/node?id=685951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Node behavior"

1

Glendinning, Paul. Shilnikov's saddle-node bifurcation. Hewlett Packard, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waterschoot, Walter van. A note on buyer behavior typologies. Universiteit Antwerpen, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Isac, Oxana. Sociologia devianței: Note de curs. Union Fenosa, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bar none. Torquere Press Publishers, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

ill, Martin Pedro 1967, ed. Parker picks. Simon & Schuster Books for Young Readers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tony, Ross. Don't do that! Crown, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baillie, Marilyn. Nose to toes. Boyds Mills Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beck, Carolyn. Richard was a picker. Orca Book Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Espeseth, Miriam. Academic listening encounters: Listening, note-taking, and discussion : content focus, human behavior. Cambridge University Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reid, Marian. Housing and anti-social behaviour: Practice note on the use of legal remedies. Chartered Institute of Housing in Scotland, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Node behavior"

1

May, Wolfgang, Franz Schenk, and Elke von Lienen. "Extending an OWL Web Node with Reactive Behavior." In Principles and Practice of Semantic Web Reasoning. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11853107_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lu, Jianquan, Lulu Li, Daniel W. C. Ho, and Jinde Cao. "Multi-agent Consensus Recovery Approach Under Node Failure." In Collective Behavior in Complex Networked Systems under Imperfect Communication. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1506-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Qi. "Study of WSNs Trust Valuation Based on Node Behavior." In Information Computing and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25255-6_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Benlian, Qinglan Chen, Wan Shi, and Xiaoying Wang. "Ocean Buoy Communication Node Selection Strategy with Intelligent Ant Behavior." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31020-1_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yin, Min, Jing Feng, and Yao Tang. "An Overview on Node Behavior Trust Evaluation in Ad Hoc Network." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36252-1_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hai, Dan, Hui Zhang, and Zhiqiang Zheng. "An Analysis of Node Localization Error Behavior in Wireless Sensor Networks." In Intelligent Robotics and Applications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16584-9_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kishoreraja, P. C., Radhika Baskar, Christeena Joseph, and M. Reji. "Identifying Sensor Node Behavior Using Temporal Correlation for Data Modifier Attack." In Advances in Automation, Signal Processing, Instrumentation, and Control. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8221-9_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dhawan, Sanjeev, Kulvinder Singh, and Amit Batra. "Community Discovery and Behavior Prediction in Online Social Networks Employing Node Centrality." In Mobile Radio Communications and 5G Networks. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7130-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khan, Shoaib, Ritu Prasad, Praneet Saurabh, and Bhupendra Verma. "Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7563-6_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Geetha, S. B., and Venkanagouda C. Patil. "BMWA: A Novel Model for Behavior Mapping for Wormhole Adversary Node in MANET." In Intelligent Computing and Information and Communication. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7245-1_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Node behavior"

1

Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. "GoNe: Dealing with node behavior." In 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin). IEEE, 2015. http://dx.doi.org/10.1109/icce-berlin.2015.7391280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li-Qin, Tian, Ni Yang, and Lin Chuang. "Node behavior trust evaluation based on behavior evidence in WSNs." In 2010 2nd International Conference on Future Computer and Communication. IEEE, 2010. http://dx.doi.org/10.1109/icfcc.2010.5497781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Padmanabh, Kumar, Sanjoy Paul, and Amrit Kumar. "On social behavior of wireless sensor node." In 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010). IEEE, 2010. http://dx.doi.org/10.1109/comsnets.2010.5431973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Adnane, Asmaa, Rafael de Sousa Jr, Christophe Bidan, and Ludovic Mè. "Integrating trust reasonings into node behavior in olsr." In the 3rd ACM workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1298239.1298267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Jun, Ning Ye, and Bin Zhao. "Node Behavior Classification in Mobile Ad Hoc Networks." In Seventh International Conference on Information Technology: New Generations (ITNG 2010). IEEE, 2010. http://dx.doi.org/10.1109/itng.2010.102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Qinghua, and Tingting Zhang. "Detecting Anomaly Node Behavior in Wireless Sensor Networks." In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07). IEEE, 2007. http://dx.doi.org/10.1109/ainaw.2007.148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lessmann, Johannes, and Sascha Lutters. "An Integrated Node Behavior Model for Office Scenarios." In 2008 41st Annual Simulation Symposium ANSS. IEEE, 2008. http://dx.doi.org/10.1109/anss-41.2008.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Das, Sujit Kumar, Bidyut Jyoti Saha, and Pinaki Sankar Chatterjee. "Selfish node detection and its behavior in WSN." In 2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2014. http://dx.doi.org/10.1109/icccnt.2014.6963086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gang He, Peng Yang, and Xiaochun Wu. "Analysis of network node behavior based on MapReduce." In 2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2014. http://dx.doi.org/10.1109/ccis.2014.7175728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sha, Zhenghui, and Jitesh H. Panchal. "Estimating the Node-Level Behaviors in Complex Networks From Structural Datasets." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12063.

Full text
Abstract:
There is an emerging class of networks that evolve endogenously based on the local characteristics and behaviors of nodes. Examples of such networks include social, economic, and peer-to-peer communication networks. The node-level behaviors determine the overall structure and performance of these networks. This is in contrast to exogenously designed networks whose structures are directly determined by network designers. To influence the performance of endogenous networks, it is crucial to understand a) what kinds of local behaviors result in the observed network structures and b) how these loc
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Node behavior"

1

Swallow, G., and I. Minei. Node Behavior upon Originating and Receiving Resource Reservation Protocol (RSVP) Path Error Messages. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Charny, A., F. Huang, G. Karagiannis, and M. Menth. Pre-Congestion Notification (PCN) Boundary-Node Behavior for the Controlled Load (CL) Mode of Operation. Edited by T. Taylor. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Charny, A., J. Zhang, G. Karagiannis, and M. Menth. Pre-Congestion Notification (PCN) Boundary-Node Behavior for the Single Marking (SM) Mode of Operation. Edited by T. Taylor. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eardley, P., ed. Metering and Marking Behaviour of PCN-Nodes. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cilliers, Jacobus, and Shardul Oza. The Motivations, Constraints, and Behaviour of Tanzania's Frontline Education Providers. Research on Improving Systems of Education (RISE), 2020. http://dx.doi.org/10.35489/bsg-rise-ri_2020/023.

Full text
Abstract:
In this note, we leverage data from a nationwide survey conducted in 2019 in Ethiopia to shed light on what Ward Education Officers do, their understanding of their own role, and the constraints they face in executing their responsibilities. We interviewed 397 WEOs responsible for primary schools across 23 districts and six regions of Tanzania as part of a baseline survey conducted between February and May 2019. This note contributes to a growing literature on the activities, self-perceptions, and motivation of public sector officials in charge of “last mile” service delivery. For example, Aiy
APA, Harvard, Vancouver, ISO, and other styles
6

Scrivens, Ryan, Steven M. Chermak, Joshua D. Freilich, Thomas W. Wojciechowski, and Richard Frank. Detecting Extremists Online: Examining Online Posting Behaviors of Violent and Non-Violent Right-Wing Extremists. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.21.remve.

Full text
Abstract:
Like most of us, violent extremists often leave a digital footprint behind. Researchers, practitioners, and policymakers raise questions about whether violent individuals can be identified online prior to their attacks offline based on their online posting behaviors. Despite ongoing concerns, few empirically grounded analyses have identified which online users have engaged in violent extremism offline and then assessed their digital footprints, and fewer analyses have identified differences in posting behaviors of those who share extreme ideological beliefs but are violent or non-violent in th
APA, Harvard, Vancouver, ISO, and other styles
7

Ajzenman, Nicolás, and Florencia López Bóo. Lessons from Behavioral Economics to Improve Treatment Adherence in Parenting Programs: An Application to SMS. Inter-American Development Bank, 2019. http://dx.doi.org/10.18235/0001981.

Full text
Abstract:
A growing literature shows how insights from behavioral economics can be successfully adopted in simple interventions through SMS or other types of low-cost communications. In this short, note we provide concrete basic guidelines to design behaviorally informed messages, based on theory and our own experience. We provide examples applied to parenting interventions.
APA, Harvard, Vancouver, ISO, and other styles
8

Badia, R., J. Ejarque, S. Böhm, C. Soriano, and R. Rossi. D4.4 API and runtime (complete with documentation and basic unit testing) for IO employing fast local storage. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.9.001.

Full text
Abstract:
This deliverable presents the activities performed on the ExaQUte project task 4.5 Development of interface to fast local storage. The activities have been focused in two aspects: reduction of the storage space used by applications and design and implementation of an interface that optimizes the use of fast local storage by MPI simulations involved in the project applications. In the rst case, for one of the environments involved in the project (PyCOMPSs) the default behavior is to keep all intermediate les until the end of the execution, in case these les are reused later by any additional ta
APA, Harvard, Vancouver, ISO, and other styles
9

Schnabel, Filipina, and Danielle Aldridge. Effectiveness of EHR-Depression Screening Among Adult Diabetics in an Urban Primary Care Clinic. University of Tennessee Health Science Center, 2021. http://dx.doi.org/10.21007/con.dnp.2021.0003.

Full text
Abstract:
Background Diabetes mellitus (DM) and depression are important comorbid conditions that can lead to more serious health outcomes. The American Diabetes Association (ADA) supports routine screening for depression as part of standard diabetes management. The PHQ2 and PHQ9 questionnaires are good diagnostic screening tools used for major depressive disorders in Type 2 diabetes mellitus (DM2). This quality improvement study aims to compare the rate of depression screening, treatment, and referral to behavioral health in adult patients with DM2 pre and post-integration of depression screening tools
APA, Harvard, Vancouver, ISO, and other styles
10

Malej, Matt, and Fengyan Shi. Suppressing the pressure-source instability in modeling deep-draft vessels with low under-keel clearance in FUNWAVE-TVD. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40639.

Full text
Abstract:
This Coastal and Hydraulics Engineering Technical Note (CHETN) documents the development through verification and validation of three instability-suppressing mechanisms in FUNWAVE-TVD, a Boussinesq-type numerical wave model, when modeling deep-draft vessels with a low under-keel clearance (UKC). Many large commercial ports and channels (e.g., Houston Ship Channel, Galveston, US Army Corps of Engineers [USACE]) are traveled and affected by tens of thousands of commercial vessel passages per year. In a series of recent projects undertaken for the Galveston District (USACE), it was discovered tha
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!