نتایج جستجو برای: mitigating
تعداد نتایج: 15720 فیلتر نتایج به سال:
System administrators use application-level knowledge to identify anomalies in virtual appliances (VAs) and to recover from them. This process can be automated through an anomaly detection and recovery system. In this thesis, we claim that application-level policies defined over kernel-level application state can be effective for automatically detecting and mitigating the effects of malicious s...
Online purchases constitute about one tenth of US retail sales. The supply chains that support online retailing are fundamentally different from those that support traditional brick-and-mortar stores. Traditional solutions are not always appropriate to solve online retailing’s operations problems; thus, there is an opportunity to understand and improve these novel supply chains. One key charact...
In an integrated fiber and wireless (FiWi) access network, multi-path routing may be applied in the wireless subnetwork to improve throughput. Due to different delays along multiple paths, packets may arrive out of order, which may cause TCP performance degradation. Although the effect of packet reordering due to multi-path routing has been well studied, remedy solutions are either to schedule ...
Removal of uranium(VI) by zerovalent iron has been suggested as a feasible pathway to control uranium contaminations in seepage waters. Available information in the literature however presents discrepant evidence on the process responsible for the mitigation effect. On basis of an EH-pH diagram of uranium and iron, it is outlined that these discrepancies may be explained by the aqueous chemistr...
We consider an appointment system where heterogeneous participants are sequenced and scheduled for service. As service times are uncertain, the aim is to mitigate the unpleasantness experienced by the participants in the system when their waiting times or delays exceed acceptable thresholds, and address fairness concerning balance of service levels among participants. In evaluating uncertain de...
The Domain Name system (DNS) has become a ubiquitous part of modern internet infrastructure that maps numeric IP address to human-readable names. In the recent years, denial of service (DoS) attacks on DNS has a trend to be more serious problems. These attack is mainly related the hierarchical namespace architecture, which is hard to avoid as this architecture are widely deployment in multi-lev...
Mitigation and adaptation represent two solutions to the issue of global warming. While mitigation aims at reducing CO2 emissions and preventing climate change, adaptation encompasses a broad scope of techniques used to reduce the impacts of climate change once they have occurred. Both have direct costs on a country’s Gross Domestic Product, but costs also arise from temperature increases due t...
This paper studies the Coremelt attack, a linkflooding Distributed Denial of Service attack that exhausts the bandwidth at a core network link using low-intensity traffics between subverted sources. A dynamical system model is formulated for analyzing the effect of the Coremelt attack on a single-link Transmission Control Protocol (TCP) network. Stability and convergence of the source flow rate...
Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید