نتایج جستجو برای: assured

تعداد نتایج: 4487  

2004
Peng Li Binoy Ravindran Douglas Jensen

We present time/utility function (TUF) algorithms that provide probabilistic assurance on timeliness behavior. A TUF, which is a generalization of the classical deadline constraint, specifies the utility of completing an application activity as a function of that activity’s completion time. The algorithms consider a stochastic model where activity execution times and arrivals are probabilistica...

Journal: :IEEE Trans. Signal Processing 1994
A. Enis Çetin Rashid Ansari

This paper presents an iterative algorithm for signal recovery from discrete-time wavelet transform maxima. The signal recovery algorithm is developed by using the method of projections onto convex sets. Convergence of the algorithm is assured.

Journal: :international journal of management and business research 2011
s. jamaledin tabibi sudabe vatankhah amir ashkan nasiripour shaghayegh vahdat somayeh hessam

planned human resource development is critical to educating a skilled and efficient workforce. the present study aimed at identifying the main factors of planned human resource development in iranian social security organization hospitals. the study is done through analysis of a questionnaire designed after identification of the main variables. iran social security organisation hospitals (the m...

2011
Michael Rossbach

In the nervous system, several key steps in cellular complexity and development are regulated by non-coding RNAs (ncRNAs) and the repressor element-1 silencing transcription factor/neuron-restrictive silencing factor (REST/NRSF). REST recruits gene regulatory complexes to regulatory sequences, among them the repressor element-1/neuron-restrictive silencer element, and mediates developmental sta...

2003
Shanshan Song Kai Hwang Rakesh Rajbanshi

A new trust-based model is developed for optimizing resource allocation in a distributed Grid computing environment. Highly shared resources in a Grid create the insecurity and dependability concerns that hinder distributed applications. We model the Grid resource allocation process as a multi-objective integer-programming problem. Trusted Grid computing power is maximized over multiple resourc...

2010
Yang Tang Patrick P. C. Lee John C. S. Lui Radia J. Perlman

While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with policy-based file assured deletion. FADE is built upon st...

2007
Natasha Malaschonok

We produce a parallel algorithm realizing the Laplace transform method for the symbolic solving of differential equations. In this paper we consider systems of ordinary linear differential equations with constant coefficients, nonzero initial conditions and right-hand parts reduced to sums of exponents with polynomial coefficients.

1999
B. Nandy

This paper examines issues related to assuring the throughput performance parameters of a Service Level Agreement in an Assured Forwarding based Diffserv-capable IP network. In an effort to understand the kinds of quantifiable parameters that can be included in a contract, the analysis of detailed studies on throughput are presented. Seven different factors are discussed which can bias bandwidt...

Journal: :Security and Communication Networks 2011
Matteo Cesana Azzedine Boukerche Albert Y. Zomaya

The rapid evolution of wireless technologies as well as their pervasive diffusion in everyday’s life has dramatically changed the world in the last two decades. On one side, service providers/operators can nowadays leverage new wireless technologies to reach new types of customers in a cost effective way; on the other side, end users are actually given richer and more flexible “connectivity opp...

2013
Michael R. Grimaila

Systems Engineering (SE) has gained favor as a means to tame the complexity of modern systems, specifically the design, analysis, and development of complex systems. This paper describes a SE approach for system assurance of modern Information Technology (IT) centric “cyber systems”. In this paper, we discuss recent trends in information security towards the establishment of security patterns a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید