نتایج جستجو برای: keywords infrastructure

تعداد نتایج: 2048419  

2012

Road authorities have confronted problems to maintaining the serviceability of road infrastructure systems by using various traditional methods of contracting. As a solution to these problems, many road authorities have started contracting out road maintenance works to the private sector based on performance measures. This contracting method is named Performance-Based Maintenance Contracting (P...

2000
Atesh Kumar Ashish Ranjan

―Cloud‖ computing – a way to increase the capacity of a network without investing in new infrastructure, training new personnel, or licensing new software. It represents service oriented architecture by offering reduced information technology overheads for the end-user, great flexibility, etc. This paper is a brief survey of cloud computing, various elements of cloud computing security and its ...

2014
Smita Karve

Wireless Ad-Hoc networks are a form of peer-topeer network where nodes can communicate with each other without any central infrastructure. In spontaneous network, devices are placed close to each other for accessing services and sharing resources among each other for short period of time and network is formed spontaneously without help of any external or central infrastructure. The proposed pro...

2013

We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion. Keywords—Power Systems, Modeling and Simulation, Agent systems.

2011
Lukasz Kulas Krzysztof Nyka

In this paper a testbed for development and verification of hybrid localization systems is presented. It allows for systematic analysis of hybrid localization methods and speed up the development of new schemes. The proposed testbed platform is composed of subsystem for sequential data collection and testing infrastructure that can be used for investigating the localization mechanisms in contro...

2013
Anton Biasizzo Franc Novak Jozef Stefan

In this paper we address the security problems of systems incorporating JTAG test infrastructure and briefly review the proposed solutions. In the following, we focus on JTAG locking mechanism and indicate some modifications to improve its resistance against possible attacks. Keywords—JTAG; security; locking mechanism;

2016
Amreesh Phokeer David Johnson Melissa Densmore

The paper describes a measurement study of mobile Internet usage in township communities in South Africa. The idea is to understand usage pattern of mobile data that would motivate the provisioning of a localised cloudlet infrastructure with an appropriate set of services. Keywords— cloud computing, wireless, availability, social media integration, synchronization, Internet measurements

2005
Arsalan Ali Shah Zafar I. Malik Shaukat Ali

Peer-to-Peer (P2P) is a self-organizing resource sharing network with no centralized authority or infrastructure, which makes it unpredictable and vulnerable. In this paper, we propose architecture to make the peer-to-peer network more centralized, predictable, and safer to use by implementing trust and stopping free riding. Keywords— File Share, Free Riding, Peer-to-Peer, Trust.

2010
Mohsen Gerami

The development of information and communication technologies depend on several factors like government policy that encourage investors to spend their money in building IT infrastructure and force business or particular institution to adopt the new technologies to bring the price down and many others. This paper investigates the state of Information and Communication Technology in Iran. Keyword...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید