نتایج جستجو برای: namely infrastructure

تعداد نتایج: 254971  

2015
Chiranjiv Roy Sourov Moitra Mainak Das Subramaniyan Srinivasan Rashika Malhotra

IT Infrastructure Management and server downtime have been an area of exploration by researchers and industry experts, for over a decade. Despite the research on web server downtime, system failure and fault prediction, etc., there is a void in the field of IT Infrastructure Downtime Management. Downtime in an IT Infrastructure can cause enormous financial, reputational and relationship losses ...

2014
B. A. Carreras

Critical infrastructures have a number of the characteristic properties of complex systems. Among these are infrequent large failures through cascading events. These events, though infrequent, often obey a power law distribution in their probability versus size which suggests that conventional risk analysis does not apply to these systems. Real infrastructure systems typically have an additiona...

2015
Oliver J. Farnan Jason R. C. Nurse

Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the security of its network and the trustworthiness and quality of the information that flows through it. Currently, low-level infrastructure vulnerability is often judged in an ad hoc manner, based on the criteria and experience of the assessors. While methodological approaches to assessing an organis...

Journal: :CoRR 2017
Chang-Sik Choi François Baccelli

This paper analyzes an emerging architecture of cellular network utilizing both planar base stations uniformly distributed in Euclidean plane and base stations located on roads. An example of this architecture is that where, in addition to conventional planar cellular base stations and users, vehicles also play the role of both base stations and users. A Poisson line process is used to model th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1392

tourism , today as one of the ways to make money, create jobs , and social and political interactions is considered. this paper aims to examine the strengths and weaknesses of tourism development in mahmoud abad ( mazandaran ). the research method in this study is " descriptive - analytical " and to collection of data used field methods such as questionnaires and documentation - library. the sa...

2009
Yoko NISHIMURA Asanobu KITAMOTO

This paper describes the digitization and utilization of Complete Map of Peking, Qianlong Period, which is the oldest measured map of Beijing made about 250 years ago. We first proposed the geometric correction method called “linepreserving distance weighting method” to preserve linear features relevant in the old map of cities. Next we improved the reliability of the old map as information inf...

Journal: :Journal of Systems and Software 2012
Gregory Katsaros George Kousiouris Spyridon V. Gogouvitis Dimosthenis Kyriazis Andreas Menychtas Theodora A. Varvarigou

While Cloud computing offers the potential to dramatically reduce the cost of software services through the commoditization of IT assets and on-demand usage patterns, one has to consider that Future Internet applications raise the need for environments that can facilitate real-time and interactivity and thus pose specific requirements to the underlying infrastructure. The latter, should be able...

Journal: :CoRR 2009
C. P. Agrawal O. P. Vyas Manoj Kumar Tiwari

A mobile ad-hoc network (MANET) is collection of intercommunicating mobile hosts forming a spontaneous network without using established network infrastructure. Unlike the cellular or infrastructure networks who have a wired backbone connecting the base-station, the MANETs have neither fixed routers nor fixed locations. Their performance largely depend upon the routing mechanism & nature of mob...

2013
Barzan Mozafari Carlo Curino Samuel Madden

Cloud computing is characterized by shared infrastructure and a decoupling between its operators and tenants. These two characteristics impose new challenges to databases applications hosted in the cloud, namely: (i) how to price database services, (ii) how to isolate database tenants, and (iii) how to optimize database performance on this shared infrastructure. We argue that today’s solutions,...

2004
Thomas Plagemann Jon Andersson Ovidiu Valentin Drugan Vera Goebel Carsten Griwodz Pål Halvorsen Ellen Munthe-Kaas Matija Puzar Norun Sanderson Katrine Stemland Skjelsvik

Information sharing is a mission critical key element in rescue and emergency operations. Mobile ad-hoc networks (MANETs) could provide a useful infrastructure to support information sharing, but appropriate applications are needed. To facilitate efficient application development for this type of infrastructure, middleware support is needed. In the Ad-Hoc InfoWare project, we are currently deve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید