نتایج جستجو برای: assurances

تعداد نتایج: 797  

Journal: :JCM 2007
Jeong-Mi Kim Oh-Han Kang Jae-Il Jung Sung Un Kim

OVPN over IP/GMPLS over DWDM technology with QoS assurances is considered as a promising approach for the next generation OVPN. In this paper, we suggest a multicast OLSP (Optical Label Switched Path) establishment mechanism for supporting high bandwidth multicast services in OVPN over IP/GMPLS over DWDM. For the establishment of the multicast OLSP, we propose a new multicast tree generation al...

Journal: :Int. J. Digital Multimedia Broadcasting 2010
Nouha Oualha Melek Önen Yves Roudier

P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings, yet they do not address the security and cooperation issues raised by self-organization. P2P systems also introduce new needs regarding data availability due to the dynamicity of the infrastructure, and which are unaddressed so...

2017
Eneken Tikk

In the era of information, administration of personal data protection mingles with expectations of access to information as well as the overall sense of cyber (in)security. A failure to appropriately consider the system of data processing relationships easily reduces personal data protection to assurances in letter. The complexity of contemporary data transactions demands a systemic and structu...

Journal: :IEEE Software 1997
Michael Diaz Joseph Sligo

n many companies, the Capability Maturity Model1 plays a major role in defining software process improvement. Frequently, organizations contemplating software process improvement (SPI) seek assurances that tangible benefits will result from such activities. Pockets of data across industry2 show that CMM-based process improvement is making a difference in those organizations committed to improve...

Journal: :Electr. Notes Theor. Comput. Sci. 2003
Lennart Beringer Kenneth MacKenzie Ian Stark

In Robert Louis Stevenson’s novel [31], Dr Jekyll is a well-regarded member of polite society, while his alter ego Mr Hyde shares the same physical form but roams abroad communing with the lowest elements. In this paper we present Grail, a well-behaved first-order functional language that is the target for an ML-like compiler; while also being a wholly imperative language of assignments that tr...

Journal: :IEEE Access 2021

Private data is transmitted and stored online every second. Therefore, security privacy assurances should be provided at all times. However, that not always the case. information often unwillingly collected, sold, or exposed, depriving owners of their rightful privacy. In this article, various threats, concepts, regulations, personal types are analyzed. An overview Privacy Enhancing Technologie...

Journal: :Advances in human services and public health (AHSPH) book series 2022

Surveillance is one of the core activities national organizations responsible for human, animal, or plant health, with goal demonstrating absence infection infestation, determining presence distribution and/or detecting as early possible exotic emerging pests and pathogens that may be harmful to agriculture environment. a tool establish pest pathogen, monitor trends, facilitate mitigation contr...

2008
Johann Eder Amirreza Tahamtan

Interorganizational workflows are a major step in automating B2B electronic commerce and to support collaborations of organizations on the technical level. Process views are an important conceptual modelling approach for interorganizational workflows as they allow interaction and communication while internal and private parts of the process can be hidden. However, it essential to guarantee that...

Journal: :Dagstuhl Reports 2013
Matt Duckham Stefan Dulman Jörg-Rüdiger Sack Monika Sester

Computational Mass Spectrometry (Dagstuhl Seminar 13491) Ruedi Aebersold, Oliver Kohlbacher, and Olga Vitek . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Geosensor Networks: Bridging Algorithms and Applications (Dagstuhl Seminar 13492) Matt Duckham, Stefan Dulman, Jörg-Rüdiger Sack, and Monika Sester . . . . . . . . . . 17 Approaches and Applications of Inductive Programming (Da...

2005
Gordon Baxter Guy Dewsbury Andrew Monk Ian Sommerville Andrey A. Povyakalo Eugenio Alberdi Ian Warren Tony Lawrie

In the UK Electronic Assistive Technology (EAT) is widely seen as a way of enabling older and disabled people to continue to live independently for longer. EAT systems are therefore critical to the health and well being of these people, and hence must be dependable. Two methods are described which provide assurances about the dependability of EAT systems. These methods adapt the concept of risk...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید