نتایج جستجو برای: redundancy strategies
تعداد نتایج: 412539 فیلتر نتایج به سال:
An important issue in multimedia servers is disk load balancing. In this paper we use randomization and data redundancy to enable good load balancing. We focus on duplicate storage strategies, i.e., each data block is stored twice. This means that a request for a block can be serviced by two disks. A consequence of such a storage strategy is that we have to decide for each block which disk to u...
In this article, the current technological state of OPC (Openness, Productivity, and Collaboration; formerly “OLE for Process Control”) standards and the problem statement of these OPC standards are discussed. The development of an OPC clientserver framework for monitoring and control systems is introduced by using the new OPC Unified Architecture (UA) specifications, Service Oriented Architect...
The resources especially energy in wireless sensor networks (WSN) are quite limited. Since sensor nodes are usually much dense, data sampled by sensor nodes have much redundancy, data aggregation becomes an effective method to eliminate redundancy, minimize the number of transmission, and then to save energy. Energy consumption is the most important factor to determine the life of a sensor netw...
Question answering systems aim to meet users’ information needs by returning exact answers in response to a question. Traditional open domain question answering systems are built around a single pipeline architecture. In an attempt to exploit multiple resources as well as multiple answering strategies, systems based on a multi-stream architecture have recently been introduced. Such systems face...
Low-dimensional representations are key to solving problems in highlevel vision, such as face compression and recognition. Factorial coding strategies for reducing the redundancy present in natural images on the basis of their second-order statistics have been successful in accounting for both psychophysical and neurophysiological properties of early vision. Class-specific representations are p...
Signal voting of redundant sensor values and communication channels is of central importance in today’s X-by-wire systems. The required degree of sensor redundancy, the type of redundancy, and finally the voting strategy must be designed to meet the system's dependability requirements. These design decisions depend on an analysis of the probabilities and effects of all underlying fault scenario...
this study gives a rough notional method to find their textual placing and valuating in the text, narrows the board of vision to mystic items and finally lists the strategies used by the translators of mathnawi to present solutions for preserving the additional values. at last, as the sum-up, strategies in comparison would be presented. it should be noted that by extending the translations from...
This research report explores the recent 3GPP LTE D2D rel. 14 Radio Resource Management specification to identify the challenges and evaluate the potentials of Unsupervised LTE D2D (mode 2) for Safety-critical V2X Communications. It also proposes two distributed resource allocation strategies for unlicensed band access. Complementary to DSRC/ITS-G5, Unsupervised LTE D2D is an opportunity to pro...
The paper presents techniques that enable the modeling and analysis of redundancy schemes in distributed objectoriented systems. The replication manager, as core part of the redundancy scheme, is modeled by using UML statecharts. The flexibility of the statechart-based modeling, which includes event processing and state hierarchy, enables an easy and efficient modeling of replication strategies...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید