نتایج جستجو برای: between
تعداد نتایج: 2818656 فیلتر نتایج به سال:
This paper presents our analysis of the failure behavior of large scale systems using the failure logs collected by Los Alamos National Laboratory on 22 of their computing clusters.We note that not all nodes show similar failure behavior in the systems. Our objective, therefore, was to arrive at an ordering of nodes to be incrementally (one by one) selected for duplication so as to achieve a ta...
This paper turns the concept of input distributions on its head to exploit inverse input distributions Al though such distributions are not always true math ematical inverses they do capture an intuitive prop erty inputs that have high frequencies in the original distribution will have low frequencies in the inverse distribution and vice versa We can use the inverse distribution in several di e...
Reliability Analysis of 2-Component Standby Redundant System with Priority under Limited Information
Some theoretical evaluation methods of mean time to failure (MTTF) in 2-component standby redundant system with priority have been suggested under the prerequisite that the probability distributions of failure and repair times in each component are respectively specified by the explicit functions. However, this prerequisite might be considerably strict in practical scenes. If we cannot identify...
The response of the water table of an intertidal salt marsh in NW England has been investigated. During neap tides, water seeps upward from the underlying sand-silt-clay interface. This effect continues as the marsh is overtopped during spring tides but is then dwarfed by penetration of water downward from the surface. Under “typical conditions” the delay between high water in the river and max...
The paper was conducted to assess the importance and challenges encountered in the current machine evaluation system in an electronics company as perceived by the respondents. In addition, it also sought to understand the acceptability of the new developed Real-Time Auto-locked Software for Electronics Company (RT-ASEC). The new automated machine evaluation software can detect any irregular mac...
Today the Chaumian Mix idea is not only an academic approach for anonymous communication, it is also a practical system with many variants used in real-world scenarios. It is therefore important to find an appropriate measure for the anonymity provided by these approaches. Many measurement approaches have been proposed that consider only the static state of the system without accounting for pas...
Dependable systems are characterized by a number of attributes including: reliability, availability, safety and security. For some attributes (namely for reliability, availability, safety), there exist probability-based theoretic foundations, enabling the application of dependability analysis techniques. The goal of dependability analysis is to forecast the values of dependability attributes, b...
In this paper, the authors examine UK mobile users’ perceptions of m-commerce utilization. For this purpose, the authors devise a Mobile Network Utilization Model empirically tested in experimental settings. The empirical findings reveal strong support for the capability of the proposed utilization model in measuring the concept of Mobile Task-Technology Fit (MTTF) and explaining the utilizatio...
Fault observability based on the behavior of memory references is studied. Traditional studies view memory as one monolithic entity that must completely work to be considered reliable. The usage patterns of a particular program’s memory are emphasized here. This paper develops a new model for the successful execution of a program taking into account the usage of the data by extending a cache me...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید