نتایج جستجو برای: backup strategy

تعداد نتایج: 348085  

Journal: :J. Comb. Optim. 2005
Yigal Bejerano Joseph Naor Alexander Sprintson

We study efficient algorithms for establishing reliable connections with bandwidth guarantees in communication networks. In the normal mode of operation, each connection uses a primary path to deliver packets from the source to the destination. To ensure continuous operation in the event of an edge failure, each connection uses a set of backup bridges, each bridge protecting a portion of the pr...

Journal: :Computer Networks 2009
Mohand Yazid Saidi Bernard Cousin Jean-Louis Le Roux

To ensure service continuity in networks, local protection pre-configuring the backup paths is preferred to global protection. Under the practical hypothesis of single physical failures in the network, the backup paths which protect against different logical failure risks (node, link and shared risk link group (SRLG)) cannot be active at the same time. Thus, sharing bandwidth between such backu...

Journal: :J. Inform. and Commun. Convergence Engineering 2010
Dong-Hui Yu

As the GPS(Global Positioning System) vulnerabilities were introduced, alternative systems to GPS backup have been studied for several years. Enhanced Loran(eLoran) as the worldwide ground-based supplementary radio navigation system was recommended as the cost effective alternative to GPS backup. Many efforts on adoption of eLoran as GPS backup have been presented. The US has been the leading r...

2007
Grant J. Esposito Thomas M. Mueller

[1] The law in the federal courts governing whether litigants must disclose their backup tapes just changed. Faced with the cost, burdens and uncertainties of mining backup tapes, as well as other sources of data that are difficult to reach, most litigants have simply been ignoring their backup tapes. No more. The amendments to the Federal Rules of Civil Procedure adopt a new standard that embr...

Journal: :PVLDB 2017
Dai Qin Ashvin Goel Angela Demke Brown

Primary-backup replication is commonly used for providing fault tolerance in databases. It is performed by replaying the database recovery log on a backup server. Such a scheme raises several challenges for modern, high-throughput multicore databases. It is hard to replay the recovery log concurrently, and so the backup can become the bottleneck. Moreover, with the high transaction rates on the...

2006
Yu Lin Haitham S. Hamza Jitender S. Deogun

In this paper, we introduce the Pre-cross-connected Segment First —PXSFirst protection scheme; a new path-based protection schemes for WDM optical networks. The goal of the PXSFirst scheme is to achieve fast recovery, while maximizing bandwidth sharing to improve bandwidth utilization. Similar to pre-cross-connected trails (PXTs) protection scheme, PXSFirst ensures that all backup paths are pre...

Journal: :IEEE Control Systems Letters 2021

Control barrier functions (CBFs) are a powerful tool to guarantee safety of autonomous systems, yet they rely on the computation control invariant sets, which is notoriously difficult. A backup strategy employs an implicit set computed by forward integrating system dynamics. However, this integration prohibitively expensive for high dimensional and inaccurate in presence unmodelled We propose l...

Journal: :Theor. Comput. Sci. 2005
Hiro Ito Kazuo Iwama Yasuo Okabe Takuya Yoshihiro

We introduce a new recovery scheme that needs only one extra backup routing table for networks employing shortest-path routing. By precomputing this backup table, the network recovers from any single link failure immediately after the failure occurs. To compute the backup routing table for this scheme, we use an almost linear time algorithm to solve the {r, v}-problem, which is a variation of t...

1998
W. Curtis Preston

Imagine having to prove everything you believe at one time. That is exactly what happened when I was asked to change the design of an Enterprise Backup System to accommodate the backup and restore needs of a new, very large system. To meet the challenge, I’d have to use three brand-new pieces of technology and push my chosen backup software to its limits. Would I be able to send that much data ...

2006
Nouha Oualha Yves Roudier

The use of mobile devices expands to various services, notably multimedia applications, resulting in huge quantity of data generated. The traditional backup function is relying entirely on the sporadic connection of the mobile device to an infrastructure. This is not sufficient to backup all the critical data handled by the mobile device. We propose a new alternative for the backup that relies ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید