نتایج جستجو برای: manageability factor

تعداد نتایج: 844767  

2010
Othmen Braham Ahmed Amamou Guy Pujolle

Adapting virtualization concepts to satisfy network telecommunication challenges receives more and more attention. The virtual network environment is formed by the amount of bounded virtual resources provided by physical network equipments. Deploying virtual network infrastructure has recently caught more research interests due to its flexibility and manageability. However, virtual network depl...

2013
Kefyalew Girma Stephen Machado

Replication or repetition is the means by which experimental error is estimated in replicated trials. In farm trials, it is sometimes not possible to replicate demonstration and test plots due to manageability and costs. In these situations, non-replicated observations and on-farm trials are used. In addition, nutrient response studies are often needed to calibrate the fertilizer requirement of...

Journal: :CAIS 2003
Neal G. Shaw

Information systems (IS) researchers find a large number of factors are related to the effectiveness of IS implementations; however, many researchers also lament the lack of theoretical relationships among the factors. In addition, recent studies of IS implementation produced conflicting results regarding the relative importance and manageability of IS implementation factors. To address these i...

2005
Christian Braun Robert Winter

Due to the growing importance of alignment, compliance and manageability issues, increased attention is being paid to architectures and architecture management recently. A holistic approach to enterprise architecture requires business related and information systems related artifacts to be equally treated. This paper describes the extension of an existing approach to enterprise architecture and...

2009
John Strassner Sung-Su Kim James Won-Ki Hong

Future Internet services will have vastly different requirements than the current Internet. Manageability, which has been largely ignored, will have the dual role of controlling capital and operational expenditures as well as enabling agile reorganization and reconfiguration of network services and resources according to changing business needs, user demands, and environmental conditions. Auton...

1999
Rolf Oppliger

In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applications generally go beyond the more traditional requirements of network security. This is particularly true for the requirements that address the complexity and availability of cryptographic applications, the anonymity o...

Journal: :TheScientificWorldJournal 2006
Trine Flensborg-Madsen Søren Ventegodt Joav Merrick

In two previous papers, we concluded that (1) the sense of coherence (SOC) scale developed by Aaron Antonovsky (1923-1994) is unable to prove the association between SOC and the physical health empirically and (2) the SOC scale is unlikely to be a fair materialization of Antonovsky's idea and, thus, unlikely to measure SOC correctly. In order to improve the scale, we developed some new question...

Journal: :European Journal of Operational Research 2013
Karl Inderfurth Stephanie Vogelgesang

We consider a manufacturer’s stochastic production/inventory problem under periodic review and present concepts for safety stock determination to cope with uncertainties that are caused by stochastic demand and different types of yield randomness. Order releases follow a linear control rule. Taking manufacturing lead times into account it turns out that safety stocks have to be considered that ...

2013
Kavita Taneja

Web information processing through modern search engines index zillions of web pages on distributed platforms of thousands of commodity web users. Much of the research has been done on the information processing aspects ranging from crawling, web graph topology, indexing, efficient query processing, caching and ranking. Despite all of the challenges, the expansion of the web has turned informat...

2005
Nikolaos Michalakis

This document analyses five systems that protect themselves from failures and malicious attacks by coupling and automating protection with their regular operation. We call such systems self-protecting. The goal of designing self-protecting systems is to reduce the trust placed on humans or external protection mechanisms and the corresponding manageability costs. The systems analyzed are: Practi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید