نتایج جستجو برای: backup coverage

تعداد نتایج: 92473  

2001
Yu Liu David Tipper

This paper addresses the spare capacity allocation (SCA) problem considering any single node failure in mesh networks. The SCA node failure problem aims at finding backup routes and providing sufficient spare capacity to protect traffic when any single node fails in communication network. Here, we introduce our novel matrix formulation of the arc-flow SCA node failure model. In this model, work...

2015
Wang Hongxia Qiu Xin

In order to reduce the impact on the grid scheduling caused by the resource error, for complex dependent tasks, designed a dynamic replication of fault-tolerant scheduling algorithm (DRFT). This algorithm build task model by applying hypergraph theory, using primary-backup task as backup mode, take the active execution mode combined with the passive execution mode to perform the backup task, se...

Journal: :Computer Networks 2015
Rodrigo De Souza Couto Stefano Secci Miguel Elias M. Campista Luís Henrique Maciel Kosmalski Costa

A key strategy to build disaster-resilient clouds is to employ backups of virtual machines in a geo-distributed infrastructure. Today, the continuous and acknowledged replication of virtual machines in different servers is a service provided by different hypervisors. This strategy guarantees that the virtual machines will have no loss of disk and memory content if a disaster occurs, at a cost o...

Journal: :CoRR 2017
Achiya Bar-On Itai Dinur Orr Dunkelman Rani Hod Nathan Keller Eyal Ronen Adi Shamir

In this paper we introduce the new problem of finding the best way to protect a computer system against cyber and ransomware attacks by choosing an optimal backup scheme using k storage devices. While in standard backup schemes it is beneficial to backup as frequently as possible, in the case of sophisticated cyber attacks any attempt to connect a backup device to an already infected computer i...

Journal: :J. Comb. Optim. 2005
Yigal Bejerano Joseph Naor Alexander Sprintson

We study efficient algorithms for establishing reliable connections with bandwidth guarantees in communication networks. In the normal mode of operation, each connection uses a primary path to deliver packets from the source to the destination. To ensure continuous operation in the event of an edge failure, each connection uses a set of backup bridges, each bridge protecting a portion of the pr...

Journal: :Computer Networks 2009
Mohand Yazid Saidi Bernard Cousin Jean-Louis Le Roux

To ensure service continuity in networks, local protection pre-configuring the backup paths is preferred to global protection. Under the practical hypothesis of single physical failures in the network, the backup paths which protect against different logical failure risks (node, link and shared risk link group (SRLG)) cannot be active at the same time. Thus, sharing bandwidth between such backu...

Journal: :J. Inform. and Commun. Convergence Engineering 2010
Dong-Hui Yu

As the GPS(Global Positioning System) vulnerabilities were introduced, alternative systems to GPS backup have been studied for several years. Enhanced Loran(eLoran) as the worldwide ground-based supplementary radio navigation system was recommended as the cost effective alternative to GPS backup. Many efforts on adoption of eLoran as GPS backup have been presented. The US has been the leading r...

2007
Grant J. Esposito Thomas M. Mueller

[1] The law in the federal courts governing whether litigants must disclose their backup tapes just changed. Faced with the cost, burdens and uncertainties of mining backup tapes, as well as other sources of data that are difficult to reach, most litigants have simply been ignoring their backup tapes. No more. The amendments to the Federal Rules of Civil Procedure adopt a new standard that embr...

Journal: :PVLDB 2017
Dai Qin Ashvin Goel Angela Demke Brown

Primary-backup replication is commonly used for providing fault tolerance in databases. It is performed by replaying the database recovery log on a backup server. Such a scheme raises several challenges for modern, high-throughput multicore databases. It is hard to replay the recovery log concurrently, and so the backup can become the bottleneck. Moreover, with the high transaction rates on the...

2006
Yu Lin Haitham S. Hamza Jitender S. Deogun

In this paper, we introduce the Pre-cross-connected Segment First —PXSFirst protection scheme; a new path-based protection schemes for WDM optical networks. The goal of the PXSFirst scheme is to achieve fast recovery, while maximizing bandwidth sharing to improve bandwidth utilization. Similar to pre-cross-connected trails (PXTs) protection scheme, PXSFirst ensures that all backup paths are pre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید