Quantitative analysis and comparisons of EPON protection schemes

被引:0
|
作者
Chen, Hong [1 ]
Jin, Depeng [1 ]
Zeng, Lieguang [1 ]
机构
[1] Tsinghua University, State Key Laboratory on Microwave and Digital Communications, Department of Electronic Engineering, Beijing 100084, China
关键词
D O I
10.1515/JOC.2007.28.4.289
中图分类号
学科分类号
摘要
引用
收藏
页码:289 / 294
相关论文
共 50 条
  • [1] Quantitative analysis and comparisons of EPON protection schemes
    Chen, H. (Chol@mails.tsinghua.edu.cn), 2005, Chinese Institute of Electronics (14):
  • [2] Quantitative analysis and comparisons of EPON protection schemes
    Chen, H
    Jin, DP
    Zeng, LG
    Su, L
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 412 - 416
  • [3] Protection Schemes of EPON-based Communication Network for Offshore Wind Power Farms
    Ahmed, Mohamed A.
    Kim, Young-Chon
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 1135 - 1139
  • [4] A Comparative Analysis of Software Protection Schemes
    Khan, Muhammad
    Akram, Muhammad
    Riaz, Naveed
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (03) : 286 - 295
  • [5] Analysis on Encrypted Biometric Template Protection Schemes
    Vasuki, R.
    Prasanna, Angeline G.
    2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,
  • [6] Recovery time analysis of WDM protection schemes
    Correia, N. S. C.
    Medeiros, M. C. R.
    ICTON 2006: 8TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 4, PROCEEDINGS: CONFERENCE & COST P 11 TRAINING SCHOOL POSTERS, 2006, : 35 - +
  • [7] A Security Analysis of Biometric Template Protection Schemes
    Zhou, Xuebing
    Wolthusen, Stephen D.
    Busch, Christoph
    Kuijper, Arjan
    IMAGE ANALYSIS AND RECOGNITION, PROCEEDINGS, 2009, 5627 : 429 - +
  • [8] ANALYSIS OF LEOPOLDS QUANTITATIVE COMPARISONS OF LANDSCAPE ESTHETICS
    HAMILL, L
    JOURNAL OF LEISURE RESEARCH, 1975, 7 (01) : 16 - 28
  • [9] Redundancy protection technology of EPON trunk
    Hu, Baomin
    Zhu, Guangxi
    Liu, Deming
    Liu, Wu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (SUPPL. 1): : 20 - 22
  • [10] Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing
    Mashima, Daisuke
    Serikova, Aidana
    Cheng, Yao
    Chen, Binbin
    ICT EXPRESS, 2018, 4 (01): : 35 - 41