نتایج جستجو برای: service decomposition

تعداد نتایج: 425753  

2003
Masafumi Oe Youki Kadobayashi Suguru Yamaguchi

The IP traceback technique detects sources of attack nodes and the paths traversed by anonymous DDoS (Distributed Denial of Service) flows with spoofed source addresses. We propose a hierarchical IP traceback architecture, which decomposes the Internet-wide traceback procedure into inter-domain traceback and intradomain traceback. Our proposed method is different from existing approaches in tha...

2010
Yuan-Ming Lu Xiao-Gang Wen Zhenghan Wang Ziqiang Wang

Citation Lu, Yuan-Ming et al. " Non-Abelian quantum Hall states and their quasiparticles: From the pattern of zeros to vertex algebra. Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. The MIT Faculty has made this article openly available. Please share how this access benefits you. ...

Journal: :iranian journal of public health 0
abdullah sarwar dept. of business administration, faculty of economics and management sciences, international islamic university malaysia, kuala lumpur, malaysia.

tourism, combined with the phrase medical, seems to be a new form of tourism which has gained huge popularity in recent decades. though, a number of literatures available with regard to the tourism industry and the competitiveness of the destination, however, the major aspects which determine the satisfaction of medical tourists are hardly focused specifically on malaysia. there is a lack of em...

Journal: :APJOR 2014
Farhad Shams Sherif Mohamed Aminah Robinson Fayek

A typical approach to handle the complexity of multi-faceted decision-making problems is to use multiattribute decision-making (MADM) methods based on pairwise comparisons. Fuzzy set theory has also been employed to cope with the uncertainty and vagueness involved in conducting the comparisons between components of a decision model. An important issue regarding the reliability of the output is ...

Journal: :CoRR 2009
Chia-Mu Yu Chun-Shien Lu Sy-Yen Kuo

Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...

Journal: :journal of advances in computer research 0

in this paper the design and implementation of fault tolerable architecture for scientific workflow engines is presented. the engines are assumed to be implemented as composite web services. current architectures for workflow engines do not make any considerations for substituting faulty web services with correct ones at run time. the difficulty is to rollback the execution state of the workflo...

ژورنال: مواد پرانرژی 2014
احمدوند, هادی, ایومن, اسماعیل, حسینی, سید قربان, قوی , اعظم ,

In this review, an attempt to collect summarized literature data on catalytic effect of nanosized metal oxides on the thermal decomposition of ammonium perchlorates is made. Several experimental results show nanometal oxides are more effective catalysts as compared to nanosized metals. Nanocatalysts decrease the activation energy and the increase the rate the thermal decomposition of ammonium p...

An atomic decomposition is considered in Banach space.  A method for constructing an atomic decomposition of Banach  space, starting with atomic decomposition of  subspaces  is presented. Some relations between them are established. The proposed method is used in the  study  of the  frame  properties of systems of eigenfunctions and associated functions of discontinuous differential operators.

2016
Feng - Zhao Jing - Chen

Mobile Internet has its own terminal access at any time, limited bandwidth and other characteristics, the effective allocation of resources and management is the primary means to improve the cloud computing performance. However, due to the diversification of its businesses, small service scheduling granularity and flexibility, for this feature, we propose resource allocation prediction method b...

1998
Peter Marbach John N. Tsitsiklis

In integrated service communication networks, an important problem is to exercise call admission control and routing so as to optimally use the network resources. This problem is naturally formulated as a dynamic programming problem, which, however, is too complex to be solved exactly. We use methods of reinforcement learning (RL), together with a decomposition approach, to find call admission ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید