نتایج جستجو برای: service decomposition
تعداد نتایج: 425753 فیلتر نتایج به سال:
The IP traceback technique detects sources of attack nodes and the paths traversed by anonymous DDoS (Distributed Denial of Service) flows with spoofed source addresses. We propose a hierarchical IP traceback architecture, which decomposes the Internet-wide traceback procedure into inter-domain traceback and intradomain traceback. Our proposed method is different from existing approaches in tha...
Citation Lu, Yuan-Ming et al. " Non-Abelian quantum Hall states and their quasiparticles: From the pattern of zeros to vertex algebra. Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. The MIT Faculty has made this article openly available. Please share how this access benefits you. ...
tourism, combined with the phrase medical, seems to be a new form of tourism which has gained huge popularity in recent decades. though, a number of literatures available with regard to the tourism industry and the competitiveness of the destination, however, the major aspects which determine the satisfaction of medical tourists are hardly focused specifically on malaysia. there is a lack of em...
A typical approach to handle the complexity of multi-faceted decision-making problems is to use multiattribute decision-making (MADM) methods based on pairwise comparisons. Fuzzy set theory has also been employed to cope with the uncertainty and vagueness involved in conducting the comparisons between components of a decision model. An important issue regarding the reliability of the output is ...
Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...
in this paper the design and implementation of fault tolerable architecture for scientific workflow engines is presented. the engines are assumed to be implemented as composite web services. current architectures for workflow engines do not make any considerations for substituting faulty web services with correct ones at run time. the difficulty is to rollback the execution state of the workflo...
In this review, an attempt to collect summarized literature data on catalytic effect of nanosized metal oxides on the thermal decomposition of ammonium perchlorates is made. Several experimental results show nanometal oxides are more effective catalysts as compared to nanosized metals. Nanocatalysts decrease the activation energy and the increase the rate the thermal decomposition of ammonium p...
An atomic decomposition is considered in Banach space. A method for constructing an atomic decomposition of Banach space, starting with atomic decomposition of subspaces is presented. Some relations between them are established. The proposed method is used in the study of the frame properties of systems of eigenfunctions and associated functions of discontinuous differential operators.
Mobile Internet has its own terminal access at any time, limited bandwidth and other characteristics, the effective allocation of resources and management is the primary means to improve the cloud computing performance. However, due to the diversification of its businesses, small service scheduling granularity and flexibility, for this feature, we propose resource allocation prediction method b...
In integrated service communication networks, an important problem is to exercise call admission control and routing so as to optimally use the network resources. This problem is naturally formulated as a dynamic programming problem, which, however, is too complex to be solved exactly. We use methods of reinforcement learning (RL), together with a decomposition approach, to find call admission ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید