نتایج جستجو برای: heterogeneous security complex

تعداد نتایج: 1059368  

2003
Yuichi Tsujita

A flexible intermediate library named Stampi for MPI-2 support on a heterogeneous computing environment has been implemented on an SCore cluster system. With the help of a flexible communication mechanism of this library, users can execute MPI functions without awareness of underlying communication mechanism. In message transfer of Stampi, a vendor-supplied MPI library and TCP sockets are used ...

2015
Erkuden Rios Eider Iturbe Leire Orue-Echevarria Arrieta Massimiliano Rak Valentina Casola

The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the overall application security including the communications and the data flow between the components. In this paper we pr...

Journal: :Ad Hoc Networks 2007
Xiaojiang Du Yang Xiao Mohsen Guizani Hsiao-Hwa Chen

Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor networks suffer from high communication...

Journal: :Wireless Communications and Mobile Computing 2018

Journal: :Egyptian Computer Science Journal 2008
Mohamad M. Eassa Ahmed S. Salama Bahaa K. Saleh

Migration of an agent involves various security problems especially in heterogeneous environment. Most of the reviewed studies for securing the mobile agent depended on one security technique. The proposed model integrates well known security techniques in four security levels: securing Mobile Agent Using Agent Factory & Blueprint, securing Mobile Agent Blueprint, securing Mobile Agent Migratio...

2010
Jian Zhong Peter Bertók Zahir Tari

Partners in VOs can share large amount of data. Sharing of individual data items is straightforward, but sharing components of complex data structures stored in heterogeneous systems is often a challenge. Sharing is typically governed by rules and policies that need to be translated into access right / privilege control and data granularity control. Simultaneous control of privileges and data g...

2007
Kyusuk Han Youngjoon Seo Sungjune Yoon

SARAH (Selective Advance Reservations and resource-Aware Handoff direction) [1] was designed to increase the efficiency of handoff in both L2 and L3 communications. However, the design was not considered to operate under the heterogeneous environments. In this paper, we discuss the security problems of SARAH such as privacy, authentication, key management, etc.. We propose a solution by separat...

Journal: :Annals of neurology 1999
R H Triepels L P van den Heuvel J L Loeffen C A Buskens R J Smeets M E Rubio Gozalbo S M Budde E C Mariman F A Wijburg P G Barth J M Trijbels J A Smeitink

Leigh syndrome is the phenotypical expression of a genetically heterogeneous cluster of disorders, with pyruvate dehydrogenase complex deficiency and respiratory chain disorders as the main biochemical causes. We report the first missense mutation within the nuclear encoded complex I subunit, NDUFS7, in 2 siblings with neuropathologically proven complex I-deficient Leigh syndrome.

2003
Bhavani Thuraisingham

The most compelling sensor technology advances of this decade are deploying wireless networks of heterogeneous smart sensor nodes for complex information gathering tasks. Sensors in wireless sensor networks operate under a set of unique and fundamental constraints that make collaborative information gathering tasks challenging. Sensors in the network simultaneously participate in the collaborat...

Journal: :international journal of management academy 0
sayyed mohsen allameh assistant professor in management group of isfahan university najmeh eizadpanah phd.candidate of organizational behavior management, university of isfahan, mirdamad campus, isfahan,

knowledge transfer was the most important factors of success for organizations in today's complex and changing environment as one of aspects of knowledge management. the aim of this study was to investigate the relationship between intrinsic motivation and extrinsic motivation by transfer the employee’s knowledge in social security organizations in kerman. the method research is descriptiv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید