نتایج جستجو برای: backup nodes
تعداد نتایج: 136625 فیلتر نتایج به سال:
b a ckground: the management of internal mammary (im) nodes in breast cancer lacks a well-defined consensus. lymphoscintigraphy identifies up to one-third of breast cancer patients with extra-axillary drainage, which is mainly located in the im chain. our aim in this meta-analysis is to identify the lymphoscintigraphy technique variables that effect im node identification. m ethods: an internet...
Resource redundancy is a primary way to improve availability for applications in computational grid. How to select backup resources for an application during the resource allocation phase and how to make advanced reservation for backup resources are challenging issues for grid environment to provide high availability service. In this paper, we proposed a backup resources selection algorithm bas...
This paper considers the following backup scheme for a database system: a database is updated at a nonhomogeneous Poisson process and an amount of updated files accumulates additively. To ensure the safety of data, full backup are performed at time NT=L or when the database fails, whichever occurs first, and between them, incremental backups are made at periodic times iT (i=1, 2, ..., N-1) so a...
In the emerging next-generation transport networks, called intelligent optical transport networks, DWDM-based optical components like add-drop multiplexers and optical cross connects will have full knowledge of the wavelengths in the network, status, and traffic carrying capacity of each wavelength. With such intelligence, these intelligent optical networks could create self-connecting and self...
Periodic data backup is a system administration requirement that has changed as wireless machines have altered the fundamental structure of networks. These changes necessitate a complete rethinking of modern network backup strategies. The approaches of the 1980’s and 1990’s are no longer sufficient and must be updated. In addition to standard backup programs from vendors, specialized system adm...
In wireless sensor networks, the voting technique is used to extract a reliable result from redundant information. Therefore, the security problem about data fusion has been the focus of study for a long time. This paper proposes a fast and tolerant voting mechanism (FTVM) for data fusion assurance, which will guarantee the base station to choose the valid fusion data in the shortest possible t...
We propose a collective approach for harnessing the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet. Instead of a purely peer-to-peer (P2P) approach, we organize participating nodes to act collectively using collective managers (CMs). Participating nodes provide idle resources to CMs, which unify these resources to run meaningful distr...
This paper proposes a new backup protection scheme, named coordinated backup protection (CBP) scheme, for distribution networks containing distributed generation. The proposed protection scheme takes into account the issues faced by traditional backup protection, such as difficulty in setting parameters and complex cooperation, and considers the features of distribution networks, such as change...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید