نتایج جستجو برای: assured
تعداد نتایج: 4487 فیلتر نتایج به سال:
We present time/utility function (TUF) algorithms that provide probabilistic assurance on timeliness behavior. A TUF, which is a generalization of the classical deadline constraint, specifies the utility of completing an application activity as a function of that activity’s completion time. The algorithms consider a stochastic model where activity execution times and arrivals are probabilistica...
This paper presents an iterative algorithm for signal recovery from discrete-time wavelet transform maxima. The signal recovery algorithm is developed by using the method of projections onto convex sets. Convergence of the algorithm is assured.
planned human resource development is critical to educating a skilled and efficient workforce. the present study aimed at identifying the main factors of planned human resource development in iranian social security organization hospitals. the study is done through analysis of a questionnaire designed after identification of the main variables. iran social security organisation hospitals (the m...
In the nervous system, several key steps in cellular complexity and development are regulated by non-coding RNAs (ncRNAs) and the repressor element-1 silencing transcription factor/neuron-restrictive silencing factor (REST/NRSF). REST recruits gene regulatory complexes to regulatory sequences, among them the repressor element-1/neuron-restrictive silencer element, and mediates developmental sta...
A new trust-based model is developed for optimizing resource allocation in a distributed Grid computing environment. Highly shared resources in a Grid create the insecurity and dependability concerns that hinder distributed applications. We model the Grid resource allocation process as a multi-objective integer-programming problem. Trusted Grid computing power is maximized over multiple resourc...
While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with policy-based file assured deletion. FADE is built upon st...
We produce a parallel algorithm realizing the Laplace transform method for the symbolic solving of differential equations. In this paper we consider systems of ordinary linear differential equations with constant coefficients, nonzero initial conditions and right-hand parts reduced to sums of exponents with polynomial coefficients.
This paper examines issues related to assuring the throughput performance parameters of a Service Level Agreement in an Assured Forwarding based Diffserv-capable IP network. In an effort to understand the kinds of quantifiable parameters that can be included in a contract, the analysis of detailed studies on throughput are presented. Seven different factors are discussed which can bias bandwidt...
The rapid evolution of wireless technologies as well as their pervasive diffusion in everyday’s life has dramatically changed the world in the last two decades. On one side, service providers/operators can nowadays leverage new wireless technologies to reach new types of customers in a cost effective way; on the other side, end users are actually given richer and more flexible “connectivity opp...
Systems Engineering (SE) has gained favor as a means to tame the complexity of modern systems, specifically the design, analysis, and development of complex systems. This paper describes a SE approach for system assurance of modern Information Technology (IT) centric “cyber systems”. In this paper, we discuss recent trends in information security towards the establishment of security patterns a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید