نتایج جستجو برای: distributed computer system

تعداد نتایج: 2749949  

2003
Stuart Anderson Juliana Küster Filipe Bowles

In applications where data needs to be shared among distributed components it is desirable to have overall data consistency at all times. This is crucial for safety-critical systems, where inconsistency can lead to failures. Overall continuous data consistency is, however, rarely possible to achieve. For distributed systems, a relaxed view based on the temporal validity of data can be proven su...

Journal: :مدیریت اطلاعات سلامت 0
خلیل کیمیا فر مربی آموزش مدارک پزشکی دانشگاه علوم پزشکی مشهد غلامرضا مرادی عضو هیأت علمی مدیریت اطلاعات بهداشتی درمانی دانشگاه علوم پزشکی مشهد فرحناز صدوقی استادیار مدیریت اطلاعات بهداشتی درمانی دانشگاه علوم پزشکی ایران معصومه سرباز مربی آموزش مدارک پزشکی دانشگاه علوم پزشکی مشهد

introduction: users of hospital information system know its problems better than others. studying their views are very important and can be especially effective in the development of the information system. the aim of this study was to investigate the users' views towards the quality of hospital information system in the training hospitals of mashhad university of medical sciences. methods: the...

2011
CHONGYANG XIE Chongyang Xie Marios S. Pattichis

OF DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Engineering The University of New Mexico Albuquerque, New Mexico

2005
Ajith Abraham

Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known...

1993
Avi Silberschatz Aaron J. Goldberg

Existing distributed operating systems lack two key features| predictability and choice. Predictability refers to the ability of the system to provide each user with a computing environment whose performance is independent of the behavior of other users. Choice refers to the ability of a user to select a computer system that meets that user's speci cations, needs or budget. In this paper, we in...

2015
Suman Joshi Gagangeet Singh

Distributed computing utilizes a network of many computers, each accomplishing a portion of an overall task, to achieve a computational result much more quickly than with a single computer. Each system is only aware about the input of the system. So there is a problem of fault tolerance in distributed system when one of the working node become overload. In this paper we have studied about vario...

1999
Andrew J. Stewart

Metastasis refers to the process by which an attacker propagates a computer penetration throughout a computer network. The traditional methodology for Internet computer penetration is sufficiently well understood to define behavior which may be indicative of an attack, e.g. for use within an Intrusion Detection System. A new model of computer penetration : distributed metastasis, increases the ...

Journal: :Behavior Research Methods, Instruments, & Computers 1992

Journal: :Behavior Research Methods & Instrumentation 1974

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید