$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for reserving system resources to assure quality of service 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/14
출원번호 US-0084053 (1993-06-29)
발명자 / 주소
  • Baugher Mark J. (Austin TX) Chang Philip Y. (Austin TX) Morris Gregory L. (Round Rock TX) Stephens Alan P. (Austin TX)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 201  인용 특허 : 0

초록

A method for providing files to a remote node including the steps of determining whether bandwidth is available for transmitting across a communications link a file requested by a remote node, reserving bandwidth for the requested file if bandwidth is determined to be available, and opening the requ

대표청구항

A method for providing multimedia files to a remote node in real-time comprising the steps of: reading, from a file requested by a remote node, a stored indication of the bandwidth required for transmitting said file across a communications link, said bandwidth for preventing jitters or glitches in

이 특허를 인용한 특허 (201)

  1. Biswas, Sukalpa; Chen, Hao, Accelerating memory operations blocked by ordering requirements and data not yet received.
  2. Katz,Shachar, Avoiding overlapping segments in transparent LAN services on ring-based networks.
  3. Cunningham, Ian M., Bandwidth allocation in ethernet networks.
  4. Sugikawa Akihiko,JPX ; Morioka Yasuhiro,JPX ; Ukita Teruhiko,JPX, Communication device.
  5. Mor, Gal; Bruckman, Leon; Zelig, David, Communication in a bidirectional ring network with single-direction receiving.
  6. Banatwala, Mustansir; Camargo, Jorge, Computer method and apparatus for previewing files outside of an application program.
  7. Steven Colby ; John J. Krawczyk ; Rai Krishnan Nair ; Katherine Royce ; Kenneth P. Siegel ; Richard C. Stevens ; Scott Wasson, Content-aware switching of network packets.
  8. Ooe Kazuichi,JPX ; Inano Satoshi,JPX, Control device for secondary storage assuring transmission bandwidth.
  9. Eriksson Anders,SEX, Controlling access to resources in a connectionless network using a ticket message containing reserved network resource allocation information.
  10. Eneboe, Michael K.; Hospodor, Andrew D., Converting asynchronous packets into isochronous packets for transmission through a multi-dimensional switched fabric network.
  11. Smith Christina,GBX ; Fletcher Steve John Harwood,GBX ; Dale Stephen G.,GBX, Data health monitor for financial information communications networks.
  12. Smith, Christina; Fletcher, Steve John Harwood; Dale, Stephen G., Data health monitor for financial information communications networks.
  13. Smith,Christina; Fletcher,Steve John Harwood; Dale,Stephen G., Data health monitor for financial information communications networks.
  14. Moskowitz, Scott A., Data protection method and device.
  15. Moskowitz, Scott A., Data protection method and device.
  16. Moskowitz, Scott A., Data protection method and device.
  17. Moskowitz, Scott A., Data protection method and device.
  18. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  19. Speeter Thomas H., Distributed connection management system with replication.
  20. Hospodor, Andrew D.; Eneboe, Michael K., Distributed resource reservation system for establishing a path through a multi-dimensional computer network to support isochronous data.
  21. Yavatkar,Rajendra S.; Toga,James E., Ensuring quality of service (QOS) for a multi-media calls through call associated individual media stream bandwidth control.
  22. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  23. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  24. Saund, Gurjeet S.; Keller, James B.; Frank, Michael, Fabric limiter circuits.
  25. Ilan, Shmuel; Bruckman, Leon, Fault-tolerant medium access control (MAC) address assignment in network elements.
  26. Horen, Robert S.; Singal, Sanjay, File system and method for administrating storage space and bandwidth in a computer system serving media assets.
  27. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  28. Bruckman,Leon, Flow allocation in a ring topology.
  29. Saund, Gurjeet S.; Keller, James B.; Frank, Michael, Hierarchical fabric control circuits.
  30. Leuca Ioan ; Ying Wen-Ping, High bandwidth delivery and internet access for airborne passengers.
  31. Leuca, Ioan; Ying, Wen Ping, High bandwidth delivery and internet access for airborne passengers.
  32. Leuca, Ioan; Ying, Wen-Ping, High bandwidth delivery and internet access for airborne passengers.
  33. Leuca,Ioan; Ying,Wen Ping, High bandwidth delivery and internet access for airborne passengers.
  34. Zelig, David; Bruckman, Leon; Solomon, Ronen; Agmon, Gideon; Kleiner, Vladimir, High capacity ring communication network.
  35. Zelig, David; Bruckman, Leon; Solomon, Ronen; Agmon, Gideon; Kleiner, Vladmir, High capacity ring communication network.
  36. Wong, Yoon Kean, Information preservation on a portable electronic device.
  37. Haney, Richard D., Inter-autonomous networking involving multiple service providers.
  38. Eneboe,Michael K.; Hospodor,Andrew D., Isochronous switched fabric network.
  39. Nielsen, Jakob, Latency-reducing bandwidth-prioritization for network servers and clients.
  40. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  41. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  42. Windham,William Anthony; Bernhardt,Richard Charles; Cain,Joseph Bibb, Load leveling in mobile ad-hoc networks to support end-to-end delay reduction, QoS and energy leveling.
  43. Zelig, David; Bruckman, Leon; Solomon, Ronen; Oster, Zeev; Rozenberg, David; Khill, Uzi, MAC address learning in a distributed bridge.
  44. Menon, Satish N.; Singal, Sanjay S., Metadata enabled push-pull model for efficient low-latency video-content distribution over a network.
  45. Black, Robert Barth, Method and aparatus for presence based resource management.
  46. Colby, Steven; Krawczyk, John J.; Nair, Raj Krishnan; Royce, Katherine; Siegel, Kenneth P.; Stevens, Richard C.; Wasson, Scott, Method and apparatus for directing a flow of packets based on request and server attributes.
  47. Kay, James, Method and apparatus for electronic mail filtering.
  48. Kay, James, Method and apparatus for electronic mail filtering.
  49. Kay, James, Method and apparatus for electronic mail filtering.
  50. Cable, Julian; Hayball, Clive; Bragg, Nigel, Method and apparatus for optimizing network service.
  51. Black, Robert Barth, Method and apparatus for presence based resource management.
  52. Klawitter, Paul T.; Gallagher, Robert S., Method and apparatus for remotely displaying screen files and efficiently handling remote operator input.
  53. Susan Nunn, Method and computer for locally and remotely updating a basic input output system (BIOS) utilizing one update file.
  54. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  55. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  56. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  57. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  58. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  59. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  60. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  61. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  62. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  63. Kamath, Sanjay; Kongelf, Michael A.; Woodahl, Leif, Method and system for flow control between a base station controller and a base transceiver station.
  64. Kamath,Sanjay; Kongelf,Michael A.; Woodahl,Leif, Method and system for flow control between a base station controller and a base transceiver station.
  65. Joshi, Vinay; Muthukumarasamy, Jayakumar; Menon, Satish; Malik, Rajiv, Method and system for reducing switching delays between digital video feeds using multicast slotted transmission technique.
  66. Jones Michael B. ; Leach Paul J. ; Draves ; Jr. Richard P. ; Barrera ; III Joseph S., Method and system for resource management with independent real-time applications on a common set of machines.
  67. Jones, Michael B.; Leach, Paul J.; Draves, Jr., Richard P.; Barrera, III, Joseph S., Method and system for resource management with independent real-time applications on a common set of machines.
  68. Jones Michael B. ; Leach Paul J. ; Draves ; Jr. Richard P. ; Barrera ; III Joseph S. ; Levi Steven P. ; Rashid Richard F. ; Fitzgerald Robert P., Method and system for scheduling the use of a computer system resource using a resource planner and a resource provider.
  69. Jones, Michael B.; Leach, Paul J.; Draves, Jr., Richard P.; Barrera, III, Joseph S.; Levi, Steven P.; Rashid, Richard F.; Fitzgerald, Robert P., Method and system for scheduling the use of a computer system resource using a resource planner and a resource provider.
  70. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  71. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  72. Maeshima Osamu,JPX ; Ito Yoshihiro,JPX ; Ishikura Masami,JPX ; Asami Tohru,JPX, Method for constructing a VPN having an assured bandwidth.
  73. Weberhofer Daniel,CHX, Method for controlling data traffic in an ATM network.
  74. Robert L. Packer ; Brett D. Galloway ; Ted Thi, Method for data rate control for heterogenous or peer internetworking.
  75. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  76. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  77. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  78. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  79. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  80. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  81. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  82. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  83. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  84. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  85. Cain,Joseph Bibb; Bernhardt,Richard Charles; Windham,William Anthony, Mobile ad hoc network (MANET) providing connectivity enhancement features and related methods.
  86. Cain,Joseph Bibb; Bernhardt,Richard Charles; Windham,William Anthony, Mobile ad hoc network (MANET) providing interference reduction features and related methods.
  87. Cain,Joseph Bibb; Bernhardt,Richard Charles; Windham,William Anthony, Mobile ad hoc network (MANET) providing quality-of-service (QoS) based unicast and multicast features.
  88. Cain,Joseph Bibb; Bernhardt,Richard Charles; Windham,William Anthony, Mobile ad hoc network (MANET) with quality-of-service (QoS) protocol hierarchy and related methods.
  89. Hazama, Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  90. Hazama, Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  91. Hazama, Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  92. Hazama, Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  93. Hazama,Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  94. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  95. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  96. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  97. Bruckman,Leon, Multipoint to multipoint communication over ring topologies.
  98. Olson Gene H., Network terminal server with full API implementation.
  99. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  100. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  101. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  102. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  103. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  104. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  105. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  106. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  107. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  108. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  109. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  110. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  111. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  112. Solomon, Ronen; Bruckman, Leon; Ram, Rafi; Zelig, David; Katz, Shachar, Point-to-multipoint functionality in a bridged network.
  113. Desai, Ravindranath S.; Woodside, Grant; Biester, William C., Prioritization and queuing of media requests.
  114. Haney, Richard D., Private tunnel usage to create wide area network backbone over the internet.
  115. Biswas, Sukalpa; Chen, Hao, Proportional memory operation throttling.
  116. Saund, Gurjeet S.; Balkan, Deniz; Wong, Kevin C., QoS inband upgrade.
  117. Saund, Gurjeet S.; Biswas, Sukalpa; Tripathi, Brijesh, Quality of service (QoS)-related fabric control.
  118. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  119. Mor, Gal; Grinfeld, Ron, Resource reservation in a ring network.
  120. Hospodor, Andrew D.; Eneboe, Michael K., Resource reservation system in a computer network to support end-to-end quality-of-service constraints.
  121. Bruckman,Leon; Harel,Rafi; Ilan,Muly, Ring network with variable rate.
  122. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  123. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  124. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  125. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  126. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  127. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  128. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  129. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  130. Lumelsky, Leon L.; Manohar, Nelson R.; Wood, Stephen P., Self-regulated resource management of distributed computer resources.
  131. Ishida, Takeshi; Yin, Jinghai; Yamamoto, Minoru, Service managing apparatus for keeping service quality by automatically allocating servers of light load to heavy task.
  132. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  133. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  134. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  135. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  136. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  137. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  138. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  139. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  140. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  141. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  142. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  143. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  144. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  145. Abbott, Michael J.; Close, Paul; Smith, Kevin P., System and method for media stream indexing and synchronization.
  146. Cross, Joseph K., System and method for probabilistic quality of communication service determination.
  147. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  148. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  149. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  150. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  151. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  152. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  153. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  154. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  155. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  156. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  157. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  158. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  159. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  160. Hubbard, Dan, System and method of controlling access to the internet.
  161. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  162. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  163. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  164. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  165. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  166. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  167. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  168. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  169. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  170. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  171. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  172. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  173. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  174. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  175. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  176. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  177. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  178. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  179. Lee Sue ; Bailey William, System for granting bandwidth for real time processes and assigning bandwidth for non-real time processes while being forced to periodically re-arbitrate for new assigned bandwidth.
  180. Goetz Tom ; Sridhar Manickam R. ; Prasad Mukesh, System, device, and method for streaming a multimedia file.
  181. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  182. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  183. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  184. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  185. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  186. Fuller, Gary J.; Vongtongtip, Stevun; Tickell, Sharon, Systems and methods for scheduling the operation of building resources.
  187. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  188. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  189. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  190. Barsheshet,Yossi; Levit,Alex, Traffic engineering in bi-directional ring networks.
  191. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  192. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  193. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  194. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  195. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  196. Bruckman, Leon; Roth, Moran; Sdayoor, Ron, VPLS failure protection in ring networks.
  197. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  198. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  199. Sasaki, Akitomo; Sato, Hiroaki; Kawai, Tomoaki; Okazaki, Hiroshi; Namikata, Takeshi, Variable frame rate adjustment in a video system.
  200. Zelig, David; Bruckman, Leon; Solomon, Ronen; Khill, Uzi; Mor, Gal, Virtual private LAN service over ring networks.
  201. Saund, Gurjeet S., Write traffic shaper circuits.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로