نتایج جستجو برای: heterogeneous security complex
تعداد نتایج: 1059368 فیلتر نتایج به سال:
A flexible intermediate library named Stampi for MPI-2 support on a heterogeneous computing environment has been implemented on an SCore cluster system. With the help of a flexible communication mechanism of this library, users can execute MPI functions without awareness of underlying communication mechanism. In message transfer of Stampi, a vendor-supplied MPI library and TCP sockets are used ...
The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the overall application security including the communications and the data flow between the components. In this paper we pr...
Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor networks suffer from high communication...
Migration of an agent involves various security problems especially in heterogeneous environment. Most of the reviewed studies for securing the mobile agent depended on one security technique. The proposed model integrates well known security techniques in four security levels: securing Mobile Agent Using Agent Factory & Blueprint, securing Mobile Agent Blueprint, securing Mobile Agent Migratio...
Partners in VOs can share large amount of data. Sharing of individual data items is straightforward, but sharing components of complex data structures stored in heterogeneous systems is often a challenge. Sharing is typically governed by rules and policies that need to be translated into access right / privilege control and data granularity control. Simultaneous control of privileges and data g...
SARAH (Selective Advance Reservations and resource-Aware Handoff direction) [1] was designed to increase the efficiency of handoff in both L2 and L3 communications. However, the design was not considered to operate under the heterogeneous environments. In this paper, we discuss the security problems of SARAH such as privacy, authentication, key management, etc.. We propose a solution by separat...
Leigh syndrome associated with a mutation in the NDUFS7 (PSST) nuclear encoded subunit of complex I.
Leigh syndrome is the phenotypical expression of a genetically heterogeneous cluster of disorders, with pyruvate dehydrogenase complex deficiency and respiratory chain disorders as the main biochemical causes. We report the first missense mutation within the nuclear encoded complex I subunit, NDUFS7, in 2 siblings with neuropathologically proven complex I-deficient Leigh syndrome.
The most compelling sensor technology advances of this decade are deploying wireless networks of heterogeneous smart sensor nodes for complex information gathering tasks. Sensors in wireless sensor networks operate under a set of unique and fundamental constraints that make collaborative information gathering tasks challenging. Sensors in the network simultaneously participate in the collaborat...
knowledge transfer was the most important factors of success for organizations in today's complex and changing environment as one of aspects of knowledge management. the aim of this study was to investigate the relationship between intrinsic motivation and extrinsic motivation by transfer the employee’s knowledge in social security organizations in kerman. the method research is descriptiv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید