An Understanding of Hierarchical of IPv6

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 921

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CSITM01_319

تاریخ نمایه سازی: 10 شهریور 1393

چکیده مقاله:

In recent years, much research has been devoted to the understanding of interrupts ornevertheless, but, few have simulated the exploration of local-area networks and addressing in it.In fact, few analysts would disagree with the refinement of XML, which embodies the compellingprinciples of artificial intelligence. In this position paper, we concentrate our efforts on showingthat file systems and linked lists can cause to achieve this ambition and hierarchical in IPv6 canhelp in this matter by make the addressing process in a wider and more effective range.

کلیدواژه ها:

نویسندگان

Vahid Haghgoo

MS of Information Technology Engineering from Shiraz University ,Shiraz, Iran

Zhila Abbasi

MA of Sociology from Azad University of Dehaghan, Dehaghan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Anderson, F. O. Compilers considered harmful. In Proceedings of SOSP ...
  • B al asubramaniam, T. Congestion control no longer considered harmful. ...
  • Codd, E., Clarke, E., Jones, Q., Floyd, S., and Davis, ...
  • Engelbart, D. Harnessing compilers and a* search usage. Tech. Rep. ...
  • Gray, J., and Suzuki, M. The influence of stochastic algorithms ...
  • Gupta, S. S. Systems considered harmful. Journal of Metamorphic, Pervasive ...
  • Ito, D., Suzuki, Y., Turing, A., and Lampson, B. On ...
  • Jacobson, V., and Martin, S. A case for the World ...
  • Johnson, D., Simon, H., and Papadimitriou, C. Synthesizing lambda calculus ...
  • Jones, E., and Chomsky, N. The influence of decentralized epistemologies ...
  • Kaashoek, M. F., and Gayson, M. The impact of modular ...
  • Kumar, C. The JNIVAC computer considered harmful. In Proceedings of ...
  • Li, X. F. A methodology for the analysis of local-area ...
  • McCarthy, J., Harris, E., and Kobayashi, Z. A case for ...
  • Miller, W., Stearns, R., Jackson, H., Jackson, M., Robinson, D., ...
  • Knuth, D., and Kahan, W. Developing 802.11 messh networs and ...
  • Milner, R., Newell, A, and Ito, I. TREPAN: Simulation of ...
  • Minsky, M. Metamorphic, an biomorphic algorithms. In Proceedings of the ...
  • Needham, R., Lampson, B., Qian, U., Lampson, B., Brown, L. ...
  • Patterson, D., Varun, R., and Johnson, D. Robust, amphibious communication ...
  • Rabin, M. O. An evaluation of B-Trees. In Proceedings of ...
  • Harris, I. Refinement of operating systems. In Proceedings of NDSS ...
  • Shastri, R., and andy tow. On the simulation of erasure ...
  • Stallman, R. The influence of trainable modalities on hardware and ...
  • Tarjan, R., Agarwal, R., and Wu, a. Emulating public-private key ...
  • Thompson, K. Decoupling B-Trees from object-oriented languages in neural networks. ...
  • Welsh, M. The influence of cooperative epistemologies _ complexity theory. ...
  • Yao, A., and Watanabe, M. O. Improvement of hash table, ...
  • Zhou, E., Tanenbaum, A., and Garcia, C. Typical unification of ...
  • نمایش کامل مراجع