Redundant Configuration of Automated Flow Lines

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Smartphone Security Configuration

Smartphones host operating systems that are on a par with modern desktop environments. For example, Google Android is a mobile operating system that is based upon a modified version of the Linux OS. Notwithstanding traditional threats to mobile phones, threats to desktop environments are also applicable to smartphones. Management of security configurations for the end-user has, to date, been co...

متن کامل

Flow Configuration

There are several flow configurations for RO that allow the user to get the most out of the system. This paper will cover a few of the techniques used in RO design to optimize system performance. These techniques include the use of concentrate staging and concentrate recirculation to increase recovery, permeate staging to attain ultrapure standards of separation, and permate throttling and inte...

متن کامل

Automated Algorithm Selection and Configuration

This report documents the programme and the outcomes of Dagstuhl Seminar 16412 “Automated Algorithm Selection and Configuration”, which was held October 9–14, 2016 and attended by 34 experts from 10 countries. Research on automated algorithm selection and configuration has lead to some of the most impressive successes within the broader area of empirical algorithmics, and has proven to be highl...

متن کامل

Automated Planning for Configuration Changes

This paper describes a prototype implementation of a configuration system which uses automated planning techniques to compute workflows between declarative states. The resulting workflows are executed using the popular combination of ControlTier and Puppet. This allows the tool to be used in unattended “autonomic” situations where manual workflow specification is not feasible. It also ensures t...

متن کامل

Automated configuration distribution in verinec

We present in this paper a system to configure networks. The Verified Network Configuration (Verinec) project aims to manage the complete network from one central XML database. This approach allows to test whether the configuration is usable prior to modify the setup of the real network devices. The distribution of the configuration is handled by the adaption module, a framework which can be ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IFAC-PapersOnLine

سال: 2016

ISSN: 2405-8963

DOI: 10.1016/j.ifacol.2016.07.864