Repository hosted by TU Delft Library

Home · Contact · About · Disclaimer ·
 

Search results also available in MS Excel format.

Showing 1 to 20 of 444 found. Next | Sort by date

1 The future - Everybody and everything connected
article 2006    
Author: Oortmerssen, G. van
[PDF]

2 Blind synchronization in asynchronous UWB networks based on the transmit-reference scheme
article 2006    
Author: Djapic, R. · Leus, G. · Veen, A.-J. van der · Trindade, A.
Keywords: Bandwidth · Blind source separation · Broadband networks · Frequency domain analysis · Signal receivers · Wireless telecommunication systems · Blind synchronization · Channel estimation · Transmit reference (TR) · Synchronization
[PDF] [Abstract]

3 Virus spread in complete bi-partite graphs
article 2007    
Author: Omic, J.S. · Kooij, R.E. · Mieghem, P. van
Keywords: Computer virus · Epidemiology · Modeling · Simulation · Computer systems · Graph theory · Network protocols · Sensor networks · Viruses · Epidemiology
[PDF] [Abstract]

4 QoS-aware bandwidth provisioning for IP network links
article 2006    
Author: Berg, J.L. van den · Mandjes, M. · Meent, R. van de · Pras, A. · Roijers, F. · Venemans, P.
Keywords: Bandwidth provisioning · Gaussian traffic · M/G/∞ input · Traffic measurements · Computer networks · Estimation · Quality of service · Telecommunication traffic · M/G/∞ input
[Abstract]

5 A versatile model for TCP bandwidth sharing in networks with heterogeneous users
article 2006    
Author: Abendroth, D. · Berg, J.L. van den · Mandjes, M.
Keywords: Acyclic networks · Flow level · Performance · Round-trip times · TCP · Throughput · User heterogeneity · Bandwidth · Internet · Local area networks · Packet networks · Quality of service · Wireless telecommunication systems · Network protocols
[Abstract]

6 Modeling ping times in First Person Shooter games
article 2006    
Author: Degrande, N. · Vleeschauwer, D. de · Kooij, R.E. · Mandjes, M.R.H.
Keywords: Analysis · On-line games · Access network · Bottleneck link · Client software · Digital subscriber lines · First person shooter games · In-process · Inter-arrival time · Network delays · Network load · Network parameters · On-line games · Packet size · Quantitative result · Round-trip time · Traffic characteristics · Modems · Queueing networks · Queueing theory · Telecommunication equipment · Telephone lines · Servers
[Abstract]

7 MUSE: Challenges to integrate the Multi-Disciplinary field of BB access in one project
article 2006    
Author: Fatome, J. · Pitois, S. · Kamagate, A. · Maillotte, H. · Massoubre., D. · González-Herráez, G.-H. · Smedt, A. de · Brink, R. van den
Keywords: Informatics · Broadband access · Integrated projects · matrixes · Multi services · Multi-disciplinary · Standardisation · Cellular radio systems · Optical communication · Quality assurance · Quality function deployment · Total quality management · Photonics
[Abstract]

8 Policy based QoS architecture in MUSE
article 2006    
Author: Rajan, G. · Elizondo Armengol, A.J. · Nooren, P. · Foglar, A.
Keywords: Informatics · Access network · Component · Local& centralized call admission control · QoS policies · Bandwidth · Broadband networks · Ethernet · Quality of service · Access network · QoS policies · Computer architecture
[Abstract]

9 High-tech meets end-user
bookPart 2008    
Author: Steen, M.G.D.
[Abstract]

10 An audit logic for accountability
article 2005    
Author: Cederquist, J.G. · Corin, R. · Dekker, M.A.C. · Etalle, S. · Hartog, J.I. den
Keywords: Informatics · Computer architecture · Distributed computer systems · Public policy · Audit logic · Decentralized architecture · Policy language · Proof checking system · Security of data
[Abstract]

11 A new generation of multi-service access networks: Results of MUSE phase I
article 2006    
Author: Vetter, P. · Fredricx, F. · Vos, B. de · Gilon, E. · Gustafsson, K. · Wellen, J. · Borgne, M. · Humphrey, L. · Smedt, A. de · Brink, R.F.M. van den
Keywords: Broadband · Lab trials · Access network · First mile · Multi-services · Phase I · Residential gateways · Network architecture
[Abstract]

12 On the potential of personal networks for hospitals
article 2006    
Author: Hartog, F.T.H. den · Schmidt, J.R. · Vries, A. de
Keywords: Health · Computer communication networks · Distributed systems · Local area networks · Mobile emergency units · Network communication protocols · Telecommunication networks · Data communication systems · Distributed computer systems · Education · Hospitals · Medical applications · Emergency surgery · Information technology · Interpersonal communication · Operating room · Patient-Centered Care · Telemedicine
[Abstract]

13 Multi-radio resource management for ambient networks
article 2005    
Author: Berggren, F. · Bria, A. · Badia, L. · Karla, I. · Litjens, R. · Magnusson, P. · Meago, F. · Tang, H. · Veronesi, R.
Keywords: Informatics · Access control · Mobile devices · Mobile radio systems · Quality of service · Resource allocation · Wireless telecommunication systems · Ambient Networks · Dynamic communication · Multi radio resource management · Multi Radio Resource Management (MRRM) · Network management
[Abstract]

14 Location-based admission control for differentiated services in 3G cellular networks
article 2006    
Author: Núñez-Queija, R. · Tan, H.-P.
Keywords: 3G cellular networks · Admission control · Differentiated services · Delay circuits · Quality of service · Telecommunication control · Telecommunication links · Tracking (position) · User interfaces · 3G cellular networks · Admission control · Differentiated services · Downlinking · Cellular neural networks
[Abstract]

15 Market potential for interactive audio-visual media
article 2005    
Author: Leurdijk, A. · Limonard, S.
Keywords: Informatics · Animation · Broadband networks · Digital communication systems · Interactive devices · Speech communication · Television broadcasting · Three dimensional computer graphics · Digital content aggregators · Interactive audio visual media · Market potentials · Programme management · Image communication systems
[Abstract]

16 Client-Server Password Recovery
article 2009    
Author: Chmielewski, L. · Hoepman, J.H. · Rossum, P. van
Keywords: Password recovery · Threshold encryption scheme · Private computing · Personal entropy
[PDF] [Abstract]

17 Maximizing classifier yield for a given accuracy
article 2008    
Author: Kraaij, W. · Raaijmakers, S.A. · Elzinga, P.
Keywords: Automatic classification · Binary classifiers · Confidence levels · Manual inspection · Meta-classifiers · Partial replacement · Artificial intelligence · Infostructures · Information Society
[PDF] [Abstract]

18 Processing in the Encrypted Domain using a Composite Signal Representation
article 2009    
Author: Bianchi, T. · Veugen, P.J.M. · Piva, A. · Barni, M.
[PDF]

19 Quality measurement of semantic standards
article 2010    
Author: Folmer, E.J.A. · Oude Luttighuis, P.H.W.M. · Hillegersberg, J. van
Keywords: Quality · Semantics · Standards · Interoperability
[PDF] [Abstract]

20 Using Advanced Integration Concepts for Trans-sector Innovation- View and Status
article 2007    
Author: Bastiaansen, H.J.M. · Baken, N.H.G.
Keywords: Innovation · Trans-sector integration · Model driven architectures · Sevice oriented architectures · Semantic web services · Ontologies
[PDF]

Search results also available in MS Excel format.

Showing 1 to 20 of 444 found. Next | Sort by date