نتایج جستجو برای: replica placement

تعداد نتایج: 81455  

2008
Osama Al-Haj Hassan Lakshmish Ramaswamy John A. Miller Khaled Rasheed E. Rodney Canfield

Recently, overlay network-based collaborative applications such as instant messaging, content sharing, and Internet telephony are becoming increasingly popular. Many of these applications rely upon data-replication to achieve better performance, scalability, and reliability. However, replication entails various costs such as storage for holding replicas and communication overheads for ensuring ...

2010
L. Anita Elizabeth V. M. Sivagami

Grid computing is the virtualization and pooling of IT resources such as compute power, storage and network capacity, and so on into a single set of shared services that can be provisioned or distributed, and then redistributed as needed. Researchers integrate the mobile devices in the grid which results in Mobile Grid. The mobile agent paradigm has attracted many attentions recently but it is ...

2008
S. V. Kozyrev

The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard replica procedure is performed.

2008
S. V. Kozyrev

The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard EA replica procedure is performed.

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2005
Pu Liu Byungchan Kim Richard A Friesner B J Berne

An innovative replica exchange (parallel tempering) method called replica exchange with solute tempering (REST) for the efficient sampling of aqueous protein solutions is presented here. The method bypasses the poor scaling with system size of standard replica exchange and thus reduces the number of replicas (parallel processes) that must be used. This reduction is accomplished by deforming the...

Journal: :J. Sensor and Actuator Networks 2012
Jun-Won Ho

In wireless sensor networks, replica node attacks are very dangerous because the attacker can compromise a single node and generate as many replicas of the compromised node as he wants, and then exploit these replicas to disrupt the normal operations of sensor networks. Several schemes have been proposed to detect replica node attacks in sensor networks. Although these schemes are capable of de...

Journal: :journal of computer and robotics 0
ali jahanian department of electrical and computer engineering, shahid beheshti university, g. c., tehran, iran morteza saheb zamani it and computer engineering department, amirkabir university of technology, tehran, iran

modern integrated circuits consist of millions of standard cells and routing paths. in nano-scale designs, mis-prediction is a dominant problem that may diminish the quality of physical design algorithms or even result in the disruption of the convergence of the design cycle. in this paper, a new planning methodology is presented in which a master-plan of the chip is constructed at the early le...

2016
Madhu Advani Surya Ganguli

2 Deriving inference error from the statistical physics of disordered systems 2 2.1 Replica equations at finite temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Replica equations in the low temperature limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Moreau envelope formulation of the replica equations . . . . . ....

2007
Giuseppe Gaeta

In the study of Replica Symmetry Breaking (RSB), one is led to consider functions f of pseu-domatrices, i.e. of matrices of order , with a real, rather than an integer, number. We propose a mathematically rigorous deenition of pseudomatrices, and show that from this it follows that the minimum of f over the space of pseudomatrices Q(x; y) which depend only on (x ?y) is also a critical point for...

Journal: :Nucleic Acids Research 1987

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید