Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 16 )

2018 ( 95 )

2017 ( 95 )

2016 ( 161 )

Custom range...

Search Results: 1 - 10 of 44792 matches for " Michael Menth "
All listed articles are free for downloading (OA Articles)
Page 1 /44792
Display every page Item
Global Locator, Local Locator, and Identifier Split (GLI-Split)
Michael Menth,Matthias Hartmann,Dominik Klein
Future Internet , 2013, DOI: 10.3390/fi5010067
Abstract: The locator/identifier split is an approach for a new addressing and routing architecture to make routing in the core of the Internet more scalable. Based on this principle, we developed the GLI-Split framework, which separates the functionality of current IP addresses into a stable identifier and two independent locators, one for routing in the Internet core and one for edge networks. This makes routing in the Internet more stable and provides more flexibility for edge networks. GLI-Split can be incrementally deployed and it is backward-compatible with the IPv6 Internet. We describe its architecture, compare it to other approaches, present its benefits, and finally present a proof-of-concept implementation of GLI-Split.
Experience-Based Admission Control in the Presence of Traffic Changes
Jens Milbrandt,Michael Menth,Jan Junker
Journal of Communications , 2007, DOI: 10.4304/jcm.2.1.10-21
Abstract: This article investigates the transient behavior of experience-based admission control (EBAC) in case of traffic changes. EBAC is a robust and resource-efficient admission control (AC) mechanism used for reservation overbooking of link capacities in packet-based networks. Recent analyses gave a proof of concept for EBAC and showed its efficiency and robustness through steady state simulation on a single link carrying traffic with constant properties. The contribution of this paper is an examination of the memory from which EBAC gains its experience and which strongly influences the behavior of EBAC in stationary and nonstationary state. For the latter, we investigate the transient behavior of the EBAC mechanism through simulation of strong traffic changes which are characterized by either a sudden decrease or increase of the traffic intensity. Our results show that the transient behavior of EBAC partly depends on its tunable memory and that it copes well with even strongly changing traffic characteristics.
Improving Experience-Based Admission Control through Traffic Type Awareness
Jens Milbrandt,Michael Menth,Jan Junker
Journal of Networks , 2007, DOI: 10.4304/jnw.2.2.11-22
Abstract: Experience-based admission control (EBAC) is a hybrid approach combining the classical parameter-based and measurement-based admission control. EBAC calculates an appropriate overbooking factor used to overbook link capacities with resource reservations in packet-switched networks. This overbooking factor correlates with the average peak-to-mean rate ratio of all admitted traffic flows on the link. So far, a single overbooking factor is calculated for the entire traffic aggregate. In this paper, we propose typespecific EBAC which provides a compound overbooking factor considering different types of traffic that subsume flows with similar peak-to-mean rate ratios. The concept can be well implemented since it does not require measurements of type-specific traffic aggregates. We give a proof of concept for this extension and compare it with the conventional EBAC approach. We show that EBAC with type-specific overbooking leads to better resource utilization under normal conditions and to faster response times for changing traffic mixes.
Aorto-venous fistula between an abdominal aortic aneurysm and an aberrant renal vein: a case report
Mélanie Faucherre, Nader Haftgoli-Bakhtiari, Markus Menth, Julien Gaude, Beat Lehmann
Journal of Medical Case Reports , 2010, DOI: 10.1186/1752-1947-4-255
Abstract: This report describes a 54-year-old Caucasian woman who was admitted to the emergency department with fatigue, severe dyspnea and bilateral lower limb edema. In the first instance this anamnesis suggested possible heart failure. In fact, our patient presented with multi-organ system failure due to a fistula between an infra-renal aortic aneurysm and an aberrant retro-aortic renal vein.To our knowledge, this is the first report of a woman with a fistula between an infra-renal aortic aneurysm and an aberrant retro-aortic left renal vein. Aorto-venous fistulas may be asymptomatic or may present with symptoms characteristic of arterio-venous shunting and/or aneurysm rupture. This type of fistula is a rare cause of heart failure. Clinical examination and imaging are essential for detection.The most common complication of abdominal aortic aneurysm (AAA) is rupture. Direct ruptures into a nearby organ, such as the duodenum and the venous system remain very rare [1]. Fistula involving a renal vein is particularly uncommon [2].Aorto-venous fistulas may be asymptomatic or may present with symptoms characteristic of arterio-venous shunting and/or aneurysm rupture [3]. Symptoms such as chest pain, signs of acute heart failure with or without electrocardiographic signs of acute coronary ischemia or a long history of chronic heart failure resistant to therapy are often present [1]. The classic triad of clinical symptoms and signs in the AAA patients with aorto-caval fistula are abdominal or back pain (or both), a pulsatile mass, and an abdominal bruit. In a review of 148 reported cases, Gilling-Smith et al. reported that this classic triad is present in only 63% [4]. The extent of the clinical manifestations of a fistula between an AAA and the venous system depends on the size, duration and location of the fistula [5].This report describes a 54-year-old Caucasian woman who was admitted to the emergency department with fatigue, severe dyspnea and bilateral lower limb edema. In the
Rapid Screening of Novel Agents for Combination Therapy in Sarcomas
Christopher L. Cubitt,Jiliana Menth,Jana Dawson,Gary V. Martinez,Parastou Foroutan,David L. Morse,Marilyn M. Bui,G. Douglas Letson,Daniel M. Sullivan,Damon R. Reed
Sarcoma , 2013, DOI: 10.1155/2013/365723
Abstract: For patients with sarcoma, metastatic disease remains very difficult to cure, and outcomes remain less than optimal. Treatment options have not largely changed, although some promising gains have been made with single agents in specific subtypes with the use of targeted agents. Here, we developed a system to investigate synergy of combinations of targeted and cytotoxic agents in a panel of sarcoma cell lines. Agents were investigated alone and in combination with varying dose ratios. Dose-response curves were analyzed for synergy using methods derived from Chou and Talalay (1984). A promising combination, dasatinib and triciribine, was explored in a murine model using the A673 cell line, and tumors were evaluated by MRI and histology for therapy effect. We found that histone deacetylase inhibitors were synergistic with etoposide, dasatinib, and Akt inhibitors across cell lines. Sorafenib and topotecan demonstrated a mixed response. Our systematic drug screening method allowed us to screen a large number of combinations of sarcoma agents. This method can be easily modified to accommodate other cell line models, and confirmatory assays, such as animal experiments, can provide excellent preclinical data to inform clinical trials for these rare malignancies. 1. Introduction Sarcomas account for 10% of pediatric diagnoses, 8% of cancers in the adolescent/young adult population, and 1% of adult cancers [1]. This diverse group of malignancies is often lethal in surgically unresectable, recurrent, or metastatic settings. Different subtypes predominate in different age groups, with rhabdomyosarcoma, osteosarcoma, and Ewing sarcoma predominating in children and young adults and leiomyosarcoma, liposarcoma, and other soft tissue sarcomas predominating in older adults. Chemotherapy has demonstrated clinical benefit in patients with advanced disease; however, for patients with advanced metastatic soft tissue sarcoma, the prognosis remains poor, with disease-free survival of 5 years or less than 25%; therefore, novel therapeutic strategies are needed. Targeted therapy has shown promise in subtypes of sarcoma, with c-Kit mutant gastrointestinal stromal tumor demonstrating the most clinical efficacy to date [2]. Signaling pathways have long been known to be active in sarcomas, with Src being the first discovered oncogene. The success of single-agent targeted therapy in gastrointestinal stromal tumors has not been reproduced in other sarcomas, although investigations regarding targeted therapies with clinical benefit, particularly in combination, continue. Single agents
Does Child Maltreatment Mediate Family Environment and Psychological Well-Being?  [PDF]
Michael Galea
Psychology (PSYCH) , 2010, DOI: 10.4236/psych.2010.12019
Abstract: This study tried to establish if childhood maltreatment mediates the established relationship between family environ-ment and psychological well-being, in a sample of Maltese university students (N = 312). However, our analysis sug-gested partial mediation only. Moreover, results indicated that abusive families are less loving, socially integrated, organized, and more conflicted. Family environment contributed positively, albeit limited, to cognitive well-being after controlling for child abuse history. In particular, cohesion, do add unique variance to subjective well-being, after controlling for child abuse. This study replicates classic research on the important role that family environment plays in children’s holistic development.
Blended Change Management: Concept and Empirical Investigation of Blending Patterns  [PDF]
Michael REISS
iBusiness (IB) , 2009, DOI: 10.4236/ib.2009.12008
Abstract: In coping with the challenges of revolutionary or evolutionary change processes, change managers do not rely on single tools but on toolboxes containing several domains of tools. The impact of toolboxes on change performance depends both on the complementary inter-domain mix and the intra-domain blending of tools. The patterns of blending are investigated both conceptually and empirically with respect to scope, diversity and coupling of tools. Survey results indicate that blending practices are predominantly determined by rational tool evaluation and by task context.
Single Wire Electrical System  [PDF]
Michael Bank
Engineering (ENG) , 2012, DOI: 10.4236/eng.2012.411092
Abstract: The purpose of this article is to remind of the past and present problems of creating single wire electrical systems. This article presents a new one wire electrical transmission system named B-Line which uses one line only and does not use ground as a second line. The proposed method is to work on all frequencies and on all communication systems including DC systems. It also proposes to work on the concept of the single-pole signal source and single-pole signal load. It illustrates the possibility of cutting the cost of electrical lines and several other advantages in the fields of high frequency communication lines and antennas.
Relationship of nine constants  [PDF]
Michael Snyder
Natural Science (NS) , 2013, DOI: 10.4236/ns.2013.59117

Through the process of trial and error, four unitless equations made up of nine constants have been found with exact answers. The related constants are the Speed of Light [1], the Planck constant [2], Wien’s displacement constant [3], Avogadro’s number [4], the universal Gravity constant [5], the Ampere constant [6], the Faraday constant [7], the Gas constant [8] and Apery’s constant [9].

The Counterfeit Electronics Problem  [PDF]
Michael Pecht
Open Journal of Social Sciences (JSS) , 2013, DOI: 10.4236/jss.2013.17003

Counterfeit electronics have been reported in a wide range of products, including computers, telecommunications equipment, automobiles, avionics and military systems. Counterfeit electronic products include everything from very inexpensive capacitors and resistors to costly microprocessors to servers. This paper describes the counterfeit electronic products problem, and discusses the implication of counterfeit electronics on the electronic supply chain. We then present counterfeit detection and prevention techniques for electronics.

Page 1 /44792
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.