نتایج جستجو برای: distribution management

تعداد نتایج: 1427238  

1999
Vincent D. Skahan Robert Katz

In early 1998, we were asked by Corporate Communications to develop a facility for providing a subscription based internal company mailing list capability that would permit Senior Executive management to send messages on an irregular basis from anywhere in the world. Shortly thereafter, we were also asked to provide a one-use-only mechanism to send all 175,000 worldwide employees a (self-qualif...

2010
Maria D. CATRINU Dag Eirik NORDGÅRD Knut SAMDAL

This paper recommends a methodological framework to facilitate the integration of risk management into the overall distribution system asset management process. The paper emphasises relevant issues that are important when implementing risk management. The clarification of these issues is useful for distribution companies interested in implementing formal procedures and routines for riskbased as...

2002
A. G. Leal

This paper presents an Integrated Management System of DistributionTransformer Loading using a relational database and loss of life estimation through artificial neural networks. This fully integrated software solution allows for technical personnel to carry out studies of transformers data, such as load curves and loss of life. It permits the analysis of these results by location and substitut...

2004
Scott D. Dexter Roman Belostotskiy Ahmet M. Eskicioglu

The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical key distribution tree. Constructing a hierarchical tree based on secret shares rather than keys yie...

2016
Quentin Gemine Damien Ernst

With the increasing share of renewable and distributed generation in electrical distribution systems, Active Network Management (ANM) has become a valuable option for a distribution system operator to operate his system in a secure and cost-effective way without relying solely on network reinforcement. ANM strategies are short-term policies that control the power injected by generators and/or t...

2002
Dinesh C. Verma Seraphin Calo

We present a policy-based architecture for the control and management of content distribution networks that form an overlay of caching proxies over an underlying physical network. The architecture extends the policy framework used for controlling network Quality of Service (QoS) and security to the case of content distribution networks. The fundamental advantage of a policy-based framework is t...

1999
Katherine L. Morse Lubomir Bic Michael Dillencourt

The High Level ArchitectureÕs Data Distribution Management services are the most recent in a succession of systems designed to reduce the amount of data received by individual simulations in large-scale distributed simulations. A common optimization in these interest management systems is the use of multicast groups for sending data to a selected subset of all potential receivers. The use of mu...

Journal: :Simul. Pr. Theory 2002
Katherine L. Morse Michael Zyda

The High Level Architecture’s Data Distribution Management services are the most recent in a succession of systems designed to reduce the amount of data received by individual simulations in large-scale distributed simulations. A common optimization in these interest management systems is the use of multicast groups for sending data to a selected subset of all potential receivers. The use of mu...

2003
Yan Sun Wade Trappe K. J. Ray Liu

In secure multicast applications, key management must be employed to provide access control to the multicast content. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating and improving the reliability of key distribution. The topology-matching ...

1995
Ashar Aziz

We present a key-distribution scheme that is particularly well suited for use in conjunction with a session-less datagram protocol such as IP or IPv6. We describe how this scheme can be used for both IP unicast and multicast applications, providing an approach for scalable multicast key distribution. We also describe an implementation of this scheme on the Solaris operating system, and present ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید