نتایج جستجو برای: backup coverage

تعداد نتایج: 92473  

1998
Ann L. Chervenak Vivekanand Vellanki Zachary Kurmas

This paper presents a survey of backup techniques for protecting file systems. These include such choices as device-based or file-based backup schemes, full vs. incremental backups, and optional data compression. Next, we discuss techniques for on-line backup (backups performed while users continue to access the file system); these techniques include file system locking and creating instantaneo...

2010
Suksant Sae Lor Raul Landa Redouane Ali Miguel Rio

In this paper, we propose a routing technique to alleviate packet loss due to transient link failures, which are major causes of disruption in the Internet. The proposed technique based on Alternate Next Hop Counters (ANHC) allows routers to calculate backup paths and re-route packets accordingly, thereby bypassing transient failures. This technique guarantees full repair coverage for single li...

2003
Roy Kucukates Cem Ersoy

Satellite systems are designed as a backup system to the existing land based wireless systems. Because of the global coverage of the system it becomes more economic for the rural areas where there is no wired infrastructure of communication. Besides being more economic to the rural areas the satellite networks are not affected by the natural disasters and continue to give the service in such si...

Journal: :Modeling and Analysis of Information Systems 2016

Journal: :Theoretical Computer Science 2012

Journal: :Bulletin des médecins suisses 2022

Journal: :Computers, Environment and Urban Systems 2007
Alan T. Murray Kamyoung Kim James W. Davis Raghu Machiraju Richard E. Parent

The placement of sensors to support security monitoring is obviously critical as it will directly impact the efficacy of allocated resources and system performance. It is critical to be able to observe and monitor the greatest total area possible. In addition, it is necessary to be able to spatially track the movement of people and activities in support of security. It is shown that important a...

2018
Zenghu Zhang Yongfeng Yin Xin Zhang Lijun Liu

Controllability of complex networks has been a hot topic in recent years. Real networks regarded as interdependent networks are always coupled together by multiple networks. The cascading process of interdependent networks including interdependent failure and overload failure will destroy the robustness of controllability for the whole network. Therefore, the optimization of the robustness of i...

2002
Murali S. Kodialam T. V. Lakshman

This paper presents a new algorithm for dynamic routing of bandwidth guaranteed multicast tunnels with failure backup. The multicast routing problem arises in many contexts such as the routing of point-to-multipoint label switched paths in Multi-Protocol Label Switched (MPLS) Networks, and the provision of bandwidth guaranteed services under the “hose” model [4]. Failure backup implies that whe...

2010
Shuichi Oikawa Jin Kawasaki

As embedded systems take more important roles at many places, it is more important for them to be able to show the evidences of system failures. Providing such evidences makes it easier to investigate the root causes of the failures and to prove the responsible parties. This paper proposes simultaneous logging and replaying of a system that enables recording evidences of system failures. The pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید