Background and Related Works Sample Clauses

Background and Related Works. After Internet Protocol (IP) and Transmission Control Protocol (TCP) were in- troduced in the 1970s, they were investigated in the literature due to their major functionality of exchanging data packets and providing a reliable byte stream service in [119] [120]. However, as discussed in Chapter 1, single-path transport protocols such as TCP, suffer from several efficiency-related issues, e.g. failure to support multihoming and bandwidth aggregation [121]. Due to this motivation, MPTCP was proposed to provide efficient data transmission in such environments [122]. Also, Stream Control Transport Protocol (SCTP) was developed to adapt multipath transmission [25]. Multipath protocols adapt fault tolerance, i.e differ- ent paths can be assigned for different tasks. For instance, the fast paths can be used for data transmission while the slow paths could be utilised for a backup process [14]. Moreover, it has been shown that the connection-level throughput region of multi-path routing/congestion control algorithms can be larger than that of a single-path congestion control scheme [123] [124]. Various studies have been proposed to develop multi-path routing/congestion control problem including the Host Identity Protocol and Mobile IP [125]. How- ever, these solutions usually have negative impacts on the congestion price, scheduling and the possible conflict with regular TCP for existing applications. The approaches to address the multipath congestion control issues can be divided into two major categories. First, the application-based approach, where software is developed and tested on an applied benchmark while neglecting the mathe- matical formulation, convergence and stability analysis of the algorithm. For instance, a Linux based software was developed in [122]. As another example, in [126], Xxx et al. proposed a fountain code based MPTCP algorithm and they report the validation of the algorithm through simulations. The main idea behind this algorithm is to use the random nature of fountain code in transmitting data through different subflows. Further, Xxxxx et al. introduce a cross layer design which benefits from the exchange information between MAC and transport layer [127]. This scheme takes into account path condition before data transfer. The paths are evaluated according to the Frame Error Rate (FER) method and the best path is considered first for transmission. This algorithm is verified over some simulation scenarios. In [128], a Reward and Penalize ...
AutoNDA by SimpleDocs
Background and Related Works. Xxxxx [12] introduced the wiretap channel model, which provides an approach to secure communications without relying on classical cryptographic approaches. Xxxxx showed that if the channel between the sender and intended legitimate receiver is statistically better, i.e., less noisy, than the channel from the sender to the adversary, then perfect secrecy is possible. Xxxxxx [11], and Ahlswede and Csisza´r [13] considered the problem of secret-key generation using public discussion. In this setting, the two communicating parties observe correlated versions of a common random source. Based on these observations both parties want to agree on the same secret key. The key agreement problem in CPSs has traditionally been con- sidered to be an issue to be addressed separately from the control- theoretic/physical aspects of the underlying control systems. For example, Xxxx-Xxxx et al. [14] presented three cryptographic key- establishment protocols for resource constrained CPSs, including one constructed using isogeny-based cryptography, which makes it well- suited for the post-quantum computing scenario. Sutrala et al. [15] proposed a three-factor user authenticated key agreement protocol which achieves user anonymity and untraceability for 5G-enabled softwarized industrial CPSs. Xxxxx et al. [16] proposed a cross-layer key establishment model for wireless devices in CPSs, where wireless devices extract master keys at the physical layer using ambient wireless signals. Following an information-theoretic approach, Xxxxx et al. [17] studied the outage probability for secrecy rate in multiple- input multiple-output (MIMO) systems for CPSs. Although the above reviewed key-agreement solutions target CPSs’ applications, such approaches do not explicitly take any advantage of the peculiar underlying physical dynamics of these systems. In recent years, there has been an increased interest towards the use of the physical properties of the underling control systems to provide security. Similar to the role of information theory in physical layer security [18], control theory provides a framework for the study of this issue in CPSs. Xx et al. [19] presented a key establishment scheme for networked control systems, where they exploited the common information of the physical system state for the key establishment between the sensor and the controller. Since the sensors can observe changes in the system state which are caused by the controller actions, hence, the controller and th...
Background and Related Works. Chapter two will offer all the background and prerequisite information necessary for understanding the work in this thesis. We will also have a review of works related to the ones we investigate and propose in this thesis.

Related to Background and Related Works

  • BACKGROUND 1.1. The “Work” is the research article, review article, letter, clinical trial study, report, article, or other copyright work, as identified in the Copyright Letter and further detailed in Schedule 1: Details of the Work (including such form of the copyright work submitted to Xxxxxxx Science for publication pursuant to clause 4, below), but excluding (except where context otherwise requires) any diagrams, figures or illustration specifically identified to Xxxxxxx Science pursuant to clause 3.2, below.

  • Background Intellectual Property ‌ Notwithstanding and superseding anything to the contrary in this ARTICLE 14, each Party retains title to all Intellectual Property Rights owned or possessed by it or any of its affiliates prior to or independent of performance of this Agreement and used by it in fulfilling its obligations under this Agreement, as well as any modifications or improvements made thereto in the course of performing this Agreement (“Background IP”). To the extent that one Party acquires any right, title, or interest in and to any aspect of the modifications or improvements to the Background IP of the other Party, such first Party shall assign such right, title, and interest to the second Party, immediately following such acquisition. If any of the Supplier’s Background IP is included in or required to use the Documentation provided by the Supplier to the City, the Supplier hereby grants to the City an irrevocable, perpetual, fully paid-up, royalty-free, worldwide, transferable and non-exclusive licence (including the right to sub-licence only to members of the City’s Group) to, itself and through contractors and agents, use, copy, amend, reproduce, modify, create derivative works of, use, commercialize, and otherwise exploit the Supplier’s Background IP but only to the extent required to use such Documentation for the purpose (or any reasonably inferred purpose) for which it has been provided or for the provision of the Supply under this Agreement (excluding any software source code).

  • Background Screening VENDOR shall comply with all requirements of Sections 1012.32 and 1012.465, Florida Statutes, and all of its personnel who (1) are to be permitted access to school grounds when students are present, (2) will have direct contact with students, or (3) have access or control of school funds, will successfully complete the background screening required by the referenced statutes and meet the standards established by the statutes. This background screening will be conducted by SBBC in advance of VENDOR or its personnel providing any services under the conditions described in the previous sentence. VENDOR shall bear the cost of acquiring the background screening required by Section 1012.32, Florida Statutes, and any fee imposed by the Florida Department of Law Enforcement to maintain the fingerprints provided with respect to VENDOR and its personnel. The parties agree that the failure of VENDOR to perform any of the duties described in this section shall constitute a material breach of this Agreement entitling SBBC to terminate immediately with no further responsibilities or duties to perform under this Agreement. VENDOR agrees to indemnify and hold harmless SBBC, its officers and employees from any liability in the form of physical or mental injury, death or property damage resulting from VENDOR’s failure to comply with the requirements of this section or with Sections 1012.32 and 1012.465, Florida Statutes.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Background Check The Department or Customer may require the Contractor to conduct background checks of its employees, agents, representatives, and subcontractors as directed by the Department or Customer. The cost of the background checks will be borne by the Contractor. The Department or Customer may require the Contractor to exclude the Contractor’s employees, agents, representatives, or subcontractors based on the background check results. In addition, the Contractor must ensure that all persons have a responsibility to self-report to the Contractor within three (3) calendar days any arrest for any disqualifying offense. The Contractor must notify the Contract Manager within twenty-four (24) hours of all details concerning any reported arrest. Upon the request of the Department or Customer, the Contractor will re-screen any of its employees, agents, representatives, and subcontractors during the term of the Contract.

  • Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.

  • Background Checks The State may require that the Contractor and Contractor Parties undergo criminal background checks as provided for in the State of Connecticut Department of Emergency Services and Public Protection Administration and Operations Manual or such other State document as governs procedures for background checks. The Contractor and Contractor Parties shall cooperate fully as necessary or reasonably requested with the State and its agents in connection with such background checks.

  • Background and Purpose Executive was employed by the Company. Executive's employment is ending effective ____________ under the conditions described in Section 3.1 of the Executive Severance Agreement ("Agreement") by and between Executive and the Company dated ____________, 2012. The purpose of this Release is to settle, and the parties hereby settle, fully and finally, any and all claims the Releasing Parties may have against the Released Parties, whether asserted or not, known or unknown, including, but not limited to, claims arising out of or related to Executive's employment, any claim for reemployment, or any other claims whether asserted or not, known or unknown, past or future, that relate to Executive's employment, reemployment, or application for reemployment.

  • Background Investigation The BOARD is prohibited from knowingly employing a person who has been convicted of committing or attempting to commit certain criminal offenses. If the required criminal background investigation is not completed at the time this Contract is signed, and the subsequent investigation report reveals that there has been a prohibited conviction, this Contract shall immediately become null and void.

  • Background IP Each Party will own all right, title and interest in its Background IP.

Time is Money Join Law Insider Premium to draft better contracts faster.