摘要:
A continuously variable transmission belt includes rings each superimposing annular component pieces on each other's inner and outer peripheries, and plural elements attached to the rings side by side in a circumferential direction. Each element includes a neck portion. The rings are disposed on opposite sides of the neck portion. The elements contact a driving pulley and a driven pulley. A lubrication oil discharge mechanism discharges out a lubrication oil in at least one of a gap between the component pieces, and a gap between each ring and the elements. A function of discharging the lubrication oil present in a region remote from the neck portion is higher than a function of discharging the lubrication oil present in a region near the neck portion. Thereby, the rings to which the elements are attached or the component pieces of the rings restrain decline in the centering characteristic in the width direction.
摘要:
In an information processing device according to an embodiment, a generating unit generates a descriptor including information indicating an area in a storage unit and state information indicating a state of an entry in which the information indicating the area is stored, and an update unit updates the state information according to at least one of writing and reading of data to the area indicated in the entry selected according to the state information by the input/output unit. The generating unit generates the descriptor in advance before at least one of writing and reading of data to/from the storage unit is started.
摘要:
In an embodiment, a key sharing device connects to external devices with paths, and includes a key storage unit, a determining unit, a first generating unit, an encrypting unit, and a first transmitting unit. The key storage unit stores cryptographic keys to be shared. The determining unit determines a path for reaching a first device via a second device when a number of the cryptographic keys out of the cryptographic keys stored in the key storage unit is a predetermined threshold or smaller. The first generating unit generates an initial key that is a new cryptographic key to be shared with the first device. The encrypting unit encrypts the initial key by using the cryptographic key. The first transmitting unit transmits the encrypted initial key to the second device with addressing the first device as destination.
摘要:
A power semiconductor module includes semiconductor elements of a first system constituting each of arms in a circuit of the first system, semiconductor elements of a second system constituting each of arms in a circuit of the second system, a plurality of DC electrode conductors including a common DC electrode conductor joined to the semiconductor elements of the first and second systems, and a plurality of AC electrode conductors joined to the respective semiconductor elements of the first and second systems. Each of the semiconductor elements of the first and second systems is interposed between the DC electrode conductor and AC electrode conductor.
摘要:
In an information processing device according to an embodiment, a generating unit generates a descriptor including information indicating an area in a storage unit and state information indicating a state of an entry in which the information indicating the area is stored, and an update unit updates the state information according to at least one of writing and reading of data to the area indicated in the entry selected according to the state information by the input/output unit. The generating unit generates the descriptor in advance before at least one of writing and reading of data to/from the storage unit is started.
摘要:
Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.
摘要:
In some illustrative embodiments, an IP-layer based network selection and multihoming method is provided that enables a flexible and secure dynamic selection of one or more serving networks for use by a client node. The method is independent of any link-layer technology. A serving network can be an ISP network, a NAP network exchange facility, a VLAN, or the like. Network information is advertised to a client node, the client node is authenticated and authorized for use of an access router, and a secure tunnel is established between the client node and the access router. The method can be implemented by using standard protocols, and can work over any existing or future link-layer technologies that are able to carry IP datagrams, without any modification.
摘要:
In some illustrative embodiments, a novel system and method is provided that can, for example, extend concepts of pre-authentication (such as, e.g., IEEE 802.11i pre-authentication) so as to operate across networks or subnetworks (such as, e.g., IP subnets). In preferred embodiments, a novel architecture includes one or both of two new mechanisms that substantially improve, e.g., higher-layer handoff performance. A first mechanism is referred to as “pre-configuration,” which allows a mobile to pre-configure higher-layer information effective in candidate IP subnets to handoff. A second mechanism is referred to as “virtual soft-handoff,” which allows a mobile to send or receive packets through the candidate IP subnets even before it is actually perform a handoff to any of the candidate IP subnets.
摘要:
For IP-based wireless systems in which base stations are connected by an IP network and communication among base stations is not controlled by the centralized management, a new system and method for realizing soft handoff by using encapsulation in order to distribute and gather a reproduced packet by the serving base station with other base stations and to transfer the serving role between the base stations as the mobile station moves is described.
摘要:
In some illustrative embodiments, a novel system and method is provided that can, for example, extend concepts of pre-authentication (such as, e.g., IEEE 802.11i pre-authentication) so as to operate across networks or subnetworks (such as, e.g., IP subnets). In preferred embodiments, a novel architecture includes one or both of two new mechanisms that substantially improve, e.g., higher-layer handoff performance. A first mechanism is referred to as “pre-configuration,” which allows a mobile to pre-configure higher-layer information effective in candidate IP subnets to handoff. A second mechanism is referred to as “virtual soft-handoff,” which allows a mobile to send or receive packets through the candidate IP subnets even before it is actually perform a handoff to any of the candidate IP subnets.