نتایج جستجو برای: configuring
تعداد نتایج: 3076 فیلتر نتایج به سال:
Abstract In recent years, ‘living lab (LL)’, a design approach that actively involves users as partners from the early stage of process, has been attracting much attention. Compared with traditional participatory or co-design approaches, one distinctive features LL is process and opportunity for user participation tends to be long-term complex. Thus, practitioners must appropriately plan effect...
We consider the problem of configuring a system in software and design database domains, where a system comprises a version for each of its constituent objects. We present a syntactic characterization of a correct configuration, tied to a transaction model, that makes it possible to generate automatically all correct configurations of a system. One can also generate configurations that satisfy ...
The congestion control mechanisms used in TCP have been the focus of numerous studies and have undergone a number of enhancements. However, even with these enhancements, TCP connections still experience alarmingly high loss rates, especially during times of congestion. To alleviate this problem, the IETF is considering active queue management mechanisms, such as RED, for deployment in the netwo...
The popularity of the object oriented programming paradigm has stimulated research into its use for parallel and distributed programming. The major issues which impact such use are concurrency control, object interfaces, binding and inheritance. This paper discusses the relative merits of current solutions to these issues and describes an approach based on the use of active objects with essenti...
This paper presents a new intelligent mediators configuration approach which exploits high expressive description logics to represent metadata, and reasoning tasks in order to build more flexible mediation systems. A user specifies a needs expression in terms of (i) an interesting view over a given application domain, (ii) sources preferences and (iii) architectural requirements. A well-adapted...
The Internet of Things (IoT) has received increased interest over the last years. Objects of the real world (e.g., cars, traffic lights, buildings, mobile phones, etc.) become connected to the Internet. It is expected that self-configuration becomes an increasingly important subject with the IoT. Self-configuring systems (SCS) adapt their behavior to changes in the environment by dynamically ch...
Many cloud vendors now provide pre-configured OS distributions and network firewall policies to simplify deployment for customers. However, even with this help, customers have little insight into the possible attack paths that adversaries may use to compromise the integrity of their computations on the cloud. In this paper, we leverage the pre-configured security policies for cloud instances to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید