Redundant Configuration of Automated Flow Lines
نویسندگان
چکیده
منابع مشابه
Automated Smartphone Security Configuration
Smartphones host operating systems that are on a par with modern desktop environments. For example, Google Android is a mobile operating system that is based upon a modified version of the Linux OS. Notwithstanding traditional threats to mobile phones, threats to desktop environments are also applicable to smartphones. Management of security configurations for the end-user has, to date, been co...
متن کاملFlow Configuration
There are several flow configurations for RO that allow the user to get the most out of the system. This paper will cover a few of the techniques used in RO design to optimize system performance. These techniques include the use of concentrate staging and concentrate recirculation to increase recovery, permeate staging to attain ultrapure standards of separation, and permate throttling and inte...
متن کاملAutomated Algorithm Selection and Configuration
This report documents the programme and the outcomes of Dagstuhl Seminar 16412 “Automated Algorithm Selection and Configuration”, which was held October 9–14, 2016 and attended by 34 experts from 10 countries. Research on automated algorithm selection and configuration has lead to some of the most impressive successes within the broader area of empirical algorithmics, and has proven to be highl...
متن کاملAutomated Planning for Configuration Changes
This paper describes a prototype implementation of a configuration system which uses automated planning techniques to compute workflows between declarative states. The resulting workflows are executed using the popular combination of ControlTier and Puppet. This allows the tool to be used in unattended “autonomic” situations where manual workflow specification is not feasible. It also ensures t...
متن کاملAutomated configuration distribution in verinec
We present in this paper a system to configure networks. The Verified Network Configuration (Verinec) project aims to manage the complete network from one central XML database. This approach allows to test whether the configuration is usable prior to modify the setup of the real network devices. The distribution of the configuration is handled by the adaption module, a framework which can be ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC-PapersOnLine
سال: 2016
ISSN: 2405-8963
DOI: 10.1016/j.ifacol.2016.07.864