Gotowa bibliografia na temat „IP”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „IP”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "IP"
Cornthwaite, Jonathan. "IP via IP". ITNOW 48, nr 4 (1.07.2006): 18–19. http://dx.doi.org/10.1093/itnow/bwl029.
Pełny tekst źródłaNewman, P., G. Minshall i T. L. Lyon. "IP switching-ATM under IP". IEEE/ACM Transactions on Networking 6, nr 2 (kwiecień 1998): 117–29. http://dx.doi.org/10.1109/90.664261.
Pełny tekst źródłaAhmed, H. M., R. Gallon, Malis i J. Moy. "IP switching for scalable IP services". Proceedings of the IEEE 85, nr 12 (1997): 1984–97. http://dx.doi.org/10.1109/5.650180.
Pełny tekst źródłaSaha, Debasri, i Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection". VLSI Design 2011 (5.04.2011): 1–10. http://dx.doi.org/10.1155/2011/731957.
Pełny tekst źródłaNiioka, H. "IP in investment banking: IP in IPOs". Journal of Intellectual Property Law & Practice 3, nr 8 (19.06.2008): 521–23. http://dx.doi.org/10.1093/jiplp/jpn105.
Pełny tekst źródłaVörg, Andreas, i Wolfgang Rosenstiel. "Automation of IP qualification and IP exchange". Integration 37, nr 4 (wrzesień 2004): 323–52. http://dx.doi.org/10.1016/j.vlsi.2004.01.005.
Pełny tekst źródłaCullem, James G. "Using IP audits to optimize IP assets". Journal of Commercial Biotechnology 16, nr 1 (styczeń 2010): 88–93. http://dx.doi.org/10.1057/jcb.2009.29.
Pełny tekst źródłaParker, Kevin J. "IP Infringement". Technology & Innovation 21, nr 3 (29.08.2020): 203–4. http://dx.doi.org/10.21300/21.3.2020.203.
Pełny tekst źródłaFaria Jr., Nelson, Carlos Cunha, Chance Mason, David Tasker, José Antonio Garcia i Carlos Capellão. "IP infrastructures". SET EXPO PROCEEDINGS 2, nr 2016 (29.08.2016): 197–200. http://dx.doi.org/10.18580/setep.2016.55.
Pełny tekst źródłaMills, Kathy Ann, i Amanda Levido. "iP ed". Reading Teacher 65, nr 1 (wrzesień 2011): 80–91. http://dx.doi.org/10.1598/rt.65.1.11.
Pełny tekst źródłaRozprawy doktorskie na temat "IP"
Pérez, Costa Xavier. "Toward All-IP networks : IP and wireless networks convergence". Doctoral thesis, Universitat Politècnica de Catalunya, 2005. http://hdl.handle.net/10803/7051.
Pełny tekst źródłaFuture All-IP networks require of an IP-based mobility management protocol to support mobility across heterogeneous networks. Several protocols are being proposed in the IETF for this purpose with Mobile IPv6, Hierarchical Mobile IPv6 and Fast Handovers for Mobile IPv6 being the ones with a higher acceptance. Our contribution in this area has been the thorough study of the performance enhancements provided by each protocol and their associated costs in realistic scenarios to support the design process of Mobile IPv6-based networks where the suitability of the different options has to be evaluated. In addition, we proposed a combination of Hierarchical Mobile IPv6 and Fast Handovers for Mobile IPv6, based on the description provided in the Hierarchical Mobile IPv6 draft, that aims to outperform both proposals by adding the advantages of each of them.
During the evaluation of the IP-based mobility management protocols, the mobility model influence over the performance results led to an additional line of study where the main characteristics of the Random Waypoint mobility model were analyzed. The random waypoint model is a commonly used mobility model for simulations of wireless communication networks. We gave a formal description of this model in terms of a discrete- time stochastic process which provides a deep understanding on the characteristics of the mobility created by its usage. The results of our work are of practical value for performance analysis of communication networks to avoid misinterpretation of simulation results.
UMTS networks being deployed today based on the Release'99 specifications use ATM transport in the Radio Access Network (RAN). The specifications for future releases include options to support IP transport in the RAN, however, several challenges are introduced with regard to a significant increase in the transport protocol overhead and the provision of QoS guarantees. These challenges have to be addressed to ensure an efficient usage of the scarce RAN resources. Our work focused first in reducing the resources needed in the air interface for the expected most relevant application in future 3G networks, Voice over IP (VoIP). We designed a radio access bearer for VoIP when Robust Header Compression (RoHC) is used that reduces in about 50% the resources required in the air interface. Then, a multiplexing scheme for the reduction of the overhead in the wired part of the RAN that allows QoS differentiated scheduling was described and evaluated. The results showed an increase in the efficiency of the RAN resources usage between 100% and 260%, in our scenarios, when combined with RoHC. Finally, we proposed and evaluated a QoS differentiated scheduling mechanism based on Earliest-Deadline-First that fulfills the RAN specific synchronization requirements while providing the QoS differentiation required by the applications.
The IEEE 802.11 standard presents relevant defficiencies in order to support applications with QoS requirements. The integration of the Wireless LAN technology in future All-IP networks heavily depends on the success of the upcoming 802.11e standard which extends the 802.11MAC layer to provide QoS guarantees. With our work in this area we contributed to the 802.11e research standardization effort and designed three extensions of the 802.11 MAC layer to provide delay guarantees (DIME-EF) and bandwidth guarantees, absolute (ARME) or relative (DWFQ).
Moreover, we analyzed the implications of introducing Wireless LAN capabilities in battery limited mobile devices as for example cellular phones. Based on the significant impact observed of the 802.11 power save mode over the 802.11e QoS mechanisms we designed and evaluated a solution that provides a soft upper bound of the data frames downlink delay according to the downlink frame interarrival time while minimizing the battery consumption. Part of this work has been used for the design and configuration of the NEC 3G/WLAN mobile terminal N900iL.
Wennersgård, Hans Harald. "Evaluering av TCP/IP versus UDP/IP for database purposes". Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9136.
Pełny tekst źródłaCai, Guan Yan. "IP infrastructure geolocation". Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45165.
Pełny tekst źródłaPhysical network maps are important to critical infrastructure defense and planning. Current state-of-the-art network infrastructure geolocation relies on Domain Name System (DNS) inferences. However, not only is using the DNS relatively in accurate for infrastructure geolocation, many router interfaces lack DNS name entries. We adapt the technique of Wang et al. to send trace route probes from distributed vantage points, and approximate a target’s location by finding the nearest landmark. To evaluate the technique’s performance, we geolocate router interfaces previously geolocated via DNS-based router positioning (DRoP). Our results show that 50% of the targets have error distances greater than 2,400 km; however, 75% of the nearest landmark predictions are less than 5 ms distant. We find that geolocation accuracy is insensitive to vantage point location, while the use of more vantage points improves accuracy. To better understand these results, we use Constraint-based Geolocation (CBG) on a subset of DRoP predictions. Forty-six percent of 4,638 DRoP location inferences are in regions outside the feasible physical boundaries imposed by CBGand 56% are 1,800 km away from the CBG centroid. Our findings suggest that our methodology can supplement prior work to not only geolocate infrastructure without DNS names, but also improve accuracy.
Chvála, Jan. "Android IP kamera". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234969.
Pełny tekst źródłaJoakim, Holmlund. "IP block signalbehandling". Thesis, Uppsala universitet, Institutionen för elektroteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447850.
Pełny tekst źródłaBendíček, Martin. "IP Multimedia Subsystem". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217500.
Pełny tekst źródłaBednář, František. "Výkonnost IP provozu". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219440.
Pełny tekst źródłaOscarsson, Tobias. "IPv6 : Övergångstekniker". Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4411.
Pełny tekst źródłaStörre krav på fler IP-adresser i framtiden har gjort IP(v6) till en tänkbar efterträdare till IP(v4). Sedan utvecklingen av IP(v6) runt 1994 står den fortfarande i skuggan av IP(v4). Detta beror troligen på att IP(v6) inte är bakåtkompatibelt med IP(v4), vilket leder till hög kostnad och energi att ersätta världens nätverk med IP(v6). Detta problem har gjort att ett flertal övergångstekniker har utvecklats. Detta kan vara genom att använda IP(v6) genom en dedikerad tunnel till att använda IP(v4) och IP(v6) parallellt. Dessa övergångstekniker skiljer sig åt när det gäller funktion och användningsområde, vilket gör val av övergångsteknik svårt.
Denna rapport handlar om dessa övergångstekniker. En inblick ges genom att beskriva hur dessa är uppbyggda, deras för- och nackdelar samt vilket användningsområde dessa är passade för. Förhoppningsvis kan denna kunskap användas för att lättare förstå hur IP(v6) fungerar och hur ett val kan göras.
Sinnarajah, Ragulan. "Efficient support for IS-IP guaranteed service in an IP-ATM internetwork". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0006/MQ40949.pdf.
Pełny tekst źródłaImmonen, Mia. "SIGTRAN : Signaling over IP -- a step closer to an all-IP network". Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92285.
Pełny tekst źródłaUnder de senaste åren har telekommunikationstjänster blivit allt mer populära, vilket har lett till ett tungt belastat signaleringsnätverk. The Signaling System number 7 (SS7) används i fasta och trådlösa nätverk och behövs för att kontrollera telefonsamtal och för tjänster såsom caller ID, roaming och för att skicka SMS. De traditionella SS7- nätverken är dyra att hyra och att expandera, varför en ny grupp av protokoll har designats för att bära signaleringsmeddelanden över IP. De nya protokollen innehåller ett transportprotokoll som heter Stream Transmission Control Protocol (SCTP) och flera adaptionslagerprotokoll, bl.a. M2PA, M2UA, M3UA och SUA. För att transportera de förlust- och förseningskänsliga signaleringsmeddelandena över IP, måste transportprotokollet möta de höga krav som SS7 har. Inte förrän IP-lösningen har testats ingående, kommer den att ersätta betydelsefulla delar av det nationella telefonnätet. I detta examensarbete har failovertiden mätts då en nätverkslänk mellan två noder har utsatts för ett avbrott. Resultaten pekar på att det är möjligt att bära SS7-trafik över IP eftersom failovertidskraven inte överstigs.
Książki na temat "IP"
Hersent, Olivier, Jean-Pierre Petit i David Gurle. IP Telephony. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470023619.
Pełny tekst źródłaHersent, Olivier. IP Telephony. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470973080.
Pełny tekst źródłaMondal, Abdul Sakib. Mobile IP. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0051-3.
Pełny tekst źródła(Jean-Marie), Munier J. M., red. TCP/IP. Paris: CampusPress, 2003.
Znajdź pełny tekst źródłaPetit, Jean-Pierre. IP Telephony. New York: John Wiley & Sons, Ltd., 2005.
Znajdź pełny tekst źródłaOdom, Wendell. IP networking. Indianapolis, Ind: Cisco Press, 2012.
Znajdź pełny tekst źródłaRosljakov, A. V. IP-telefonija. Moskva: Ėko-trendz, 2003.
Znajdź pełny tekst źródłaDell, Tom. AppleShare IP. Boston: AP Professional, 1998.
Znajdź pełny tekst źródłaBob, Willsey, red. TCP/IP. Paris: CampusPress France, 1999.
Znajdź pełny tekst źródłaC, Kolon Matthew, red. IP telephony. New York: McGraw-Hill, 2000.
Znajdź pełny tekst źródłaCzęści książek na temat "IP"
Buchanan, W. J. "IP". W The Complete Handbook of the Internet, 495–530. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_24.
Pełny tekst źródłaWalker, Stuart. "IP". W Design Realities, 147–48. spirit / Stuart Walker. Description: First edition. |: Routledge, 2018. http://dx.doi.org/10.4324/9780429489037-62.
Pełny tekst źródłaBuchanan, W. J. "IP". W The Handbook of Data Communications and Networks, 963–98. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4020-7870-5_60.
Pełny tekst źródłaBährle-Rapp, Marina. "IP". W Springer Lexikon Kosmetik und Körperpflege, 283. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_5269.
Pełny tekst źródłaMittelstaedt, Axel. "IP-HRM – Der IP-Manager". W Intellectual Property Management, 139–44. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-02992-0_14.
Pełny tekst źródłaVaumorin, Emmanuel, Bernard Kasser, Sylvain Duvillard i Albert Martinez. "IP-XACT Extensions for Cryptographic IP". W Trusted Computing for Embedded Systems, 285–94. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09420-5_14.
Pełny tekst źródłaPaul, Sanjoy. "IP Multicast". W Multicasting on the Internet and its Applications, 29–38. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4615-5713-5_4.
Pełny tekst źródłaPrud’homme, Dan, i Taolue Zhang. "IP Enforcement". W China’s Intellectual Property Regime for Innovation, 133–96. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10404-7_7.
Pełny tekst źródłaWege, Patrick, Stefan Müller i Leonie Kempel. "IP-Compliance". W Management geistigen Eigentums, 239–316. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-19840-3_7.
Pełny tekst źródłaKempf, James. "IP Mobility". W Next Generation Mobile Systems 3G and Beyond, 129–56. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470091533.ch5.
Pełny tekst źródłaStreszczenia konferencji na temat "IP"
Bhatti, Saleem N., Ditchaphong Phoomikiattisak i Bruce Simpson. "IP without IP addresses". W AINTEC '16: Asian Internet Engineering Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3012695.3012701.
Pełny tekst źródłaTrossen, Dirk, Martin J. Reed, Janne Riihijarvi, Michael Georgiades, Nikos Fotiou i George Xylomenos. "IP over ICN - The better IP?" W 2015 European Conference on Networks and Communications (EuCNC). IEEE, 2015. http://dx.doi.org/10.1109/eucnc.2015.7194109.
Pełny tekst źródłaLi, Xinyu, i Omar Hammami. "Small scale multiprocessor soft IP (SSM IP)". W Proceeding of the ACM/SIGDA international symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1508128.1508180.
Pełny tekst źródłaKolluru, Durga Sowjanya, i P. Bhaskara Reddy. "IP to IP Calling Through Socket Programming". W 2021 Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2021. http://dx.doi.org/10.1109/asiancon51346.2021.9544997.
Pełny tekst źródłaKolluru, Durga Sowjanya, i P. Bhaskara Reddy. "IP to IP Calling Through Socket Programming". W 2021 Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2021. http://dx.doi.org/10.1109/asiancon51346.2021.9544997.
Pełny tekst źródłaReis, André I., i Roner G. Fabris. "What about the IP of your IP?" W the 22nd Annual Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1601896.1601898.
Pełny tekst źródłaLaBrecque, Douglas J. "IP tomography". W SEG Technical Program Expanded Abstracts 1991. Society of Exploration Geophysicists, 1991. http://dx.doi.org/10.1190/1.1889161.
Pełny tekst źródłaForemski, Pawel, David Plonka i Arthur Berger. "Entropy/IP". W IMC 2016: Internet Measurement Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2987443.2987445.
Pełny tekst źródłaMatejka, Justin, Tovi Grossman i George Fitzmaurice. "IP-QAT". W the 24th annual ACM symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2047196.2047218.
Pełny tekst źródłaBorchert, Christoph, Daniel Lohmann i Olaf Spinczyk. "CiAO/IP". W the 10th international conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2307636.2307676.
Pełny tekst źródłaRaporty organizacyjne na temat "IP"
Simpson, W. IP in IP Tunneling. RFC Editor, październik 1995. http://dx.doi.org/10.17487/rfc1853.
Pełny tekst źródłaPerkins, C. IP Encapsulation within IP. RFC Editor, październik 1996. http://dx.doi.org/10.17487/rfc2003.
Pełny tekst źródłaSocolofsky, T. J., i C. J. Kale. TCP/IP tutorial. RFC Editor, styczeń 1991. http://dx.doi.org/10.17487/rfc1180.
Pełny tekst źródłaAtkinson, R. IP Authentication Header. RFC Editor, sierpień 1995. http://dx.doi.org/10.17487/rfc1826.
Pełny tekst źródłaPerkins, C., red. IP Mobility Support. RFC Editor, październik 1996. http://dx.doi.org/10.17487/rfc2002.
Pełny tekst źródłaRenwick, J. IP over HIPPI. RFC Editor, styczeń 1997. http://dx.doi.org/10.17487/rfc2067.
Pełny tekst źródłaKent, S., i R. Atkinson. IP Authentication Header. RFC Editor, listopad 1998. http://dx.doi.org/10.17487/rfc2402.
Pełny tekst źródłaDegermark, M., B. Nordgren i S. Pink. IP Header Compression. RFC Editor, luty 1999. http://dx.doi.org/10.17487/rfc2507.
Pełny tekst źródłaThaler, D. IP Tunnel MIB. RFC Editor, sierpień 1999. http://dx.doi.org/10.17487/rfc2667.
Pełny tekst źródłaRajagopalan, B. Electricity over IP. RFC Editor, kwiecień 2002. http://dx.doi.org/10.17487/rfc3251.
Pełny tekst źródła