نتایج جستجو برای: backup coverage

تعداد نتایج: 92473  

2003
Chunjiang Li Nong Xiao Xuejun Yang

Resource redundancy is a primary way to improve availability for applications in computational grid. How to select backup resources for an application during the resource allocation phase and how to make advanced reservation for backup resources are challenging issues for grid environment to provide high availability service. In this paper, we proposed a backup resources selection algorithm bas...

Journal: :JCP 2010
Cunhua Qian Yingyan Huang Xufeng Zhao Toshio Nakagawa

This paper considers the following backup scheme for a database system: a database is updated at a nonhomogeneous Poisson process and an amount of updated files accumulates additively. To ensure the safety of data, full backup are performed at time NT=L or when the database fails, whichever occurs first, and between them, incremental backups are made at periodic times iT (i=1, 2, ..., N-1) so a...

Journal: :Computer Communications 2004
Chava Vijaya Saradhi C. Siva Ram Murthy

In the emerging next-generation transport networks, called intelligent optical transport networks, DWDM-based optical components like add-drop multiplexers and optical cross connects will have full knowledge of the wavelengths in the network, status, and traffic carrying capacity of each wavelength. With such intelligence, these intelligent optical networks could create self-connecting and self...

2004
Gregory Pluta Larry Brumbaugh William Yurcik Joseph Tucek

Periodic data backup is a system administration requirement that has changed as wireless machines have altered the fundamental structure of networks. These changes necessitate a complete rethinking of modern network backup strategies. The approaches of the 1980’s and 1990’s are no longer sufficient and must be updated. In addition to standard backup programs from vendors, specialized system adm...

2017
Jinghan He Lin Liu Fanfan Ding Changcheng Li Dahai Zhang

This paper proposes a new backup protection scheme, named coordinated backup protection (CBP) scheme, for distribution networks containing distributed generation. The proposed protection scheme takes into account the issues faced by traditional backup protection, such as difficulty in setting parameters and complex cooperation, and considers the features of distribution networks, such as change...

Journal: :TIIS 2016
Xinyi Li Yong Qi Pengfei Chen Xiaohui Zhang

Cloud computing promises high performance and cost-efficiency. However, most cloud infrastructures operate at a low utilization, which greatly adheres cost effectiveness. Previous works focus on seeking efficient virtual machine (VM) consolidation strategies to increase the utilization of virtual resources in production environment, but overlook the under-utilization of backup virtual resources...

2005
Saqib Raza Faisal Aslam Shahab Baqai Zartash Afzal Uzmi

We consider a label switched network in which backup paths are provided using a local restoration scheme [1], [2]. A node receives a failure notification if either an adjacent link or a neighboring node fails. Such a node, however, cannot distinguish between link and node failures and must do one of two things. 1) Activate backup paths corresponding to both the link and the node suspected to ha...

2007
Anshu Sharma

We survey two schemes for fault tolerance for diierent fault models. The rst, primary-backup approach deals with disaster recovery. The second, is aimed at developing commit protocols that tolerate commission failures. A remote backup database system tracks the state of a primary system, taking over transaction processing when disaster hits the primary site. The primary and backup sites are phy...

2014
Tim Schulte Thomas Keller

Successful heuristic search planners for satisficing planning like FF or LAMA are usually based on one or more best first search techniques. Recent research has led to planners like Arvand, Roamer or Probe, where novel techniques like Monte-Carlo Random Walks extend the traditional exploitation-focused best first search by an exploration component. The UCT algorithm balances these contradictory...

1998
William Yurcik

This paper presents simulation experiments investigating the feasibility and cost of providing survivability to ATM multipoint groups using dedicated bandwidth on disjoint backup groups. Disjoint dedicated backup groups are formed via the VC Mesh model by two different approaches: (1) a backup group consisting exclusively of point-to-point circuits (unicast), or (2) a backup group consisting ex...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید