The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The mobility management of human resources under constrains within multi-sites enterprise such as the redeployment and the recruitment can be considered as a complex assignment. The presented approach in this paper describes an expert system to optimize this constrained mobility of Human Resources by identifying the employees can be reassigned or recruited able to contribute positively in increasing...
Amazon Ec2 service offers two diverse instance purchasing options. Users can either run instances by using on-demand plan and pay only for the incurred instance-hours, or by renting instances for a long period, while taking advantage of significant reductions (up to 60%). One of the major problems facing these users is cost management. How to dynamically combine between these two options, to serve...
Protecting and auditing data is not an easy task, especially when it comes to cloud storage. As such, it is essential to design an efficient data auditing scheme along with a recovery process while controlling the cloud fees, in the literature, many works has been devoted to cloud storage security, but the majority did not consider the cloud fees into account or provide a cost analysis of their solutions...
Network topology discovery describes the physical structure of the network, which in turn reflects the purpose of this network design. Used tools and techniques vary depending on that structure in order to choose the optimal methods for implementing the appropriate distributed applications. Mobile agents have become a focus of attention for implementing distributed management architectures because...
Biometrics has become one of the reliable averages to construct the recognition systems of personal identity. Recent studies have attracted the attention of researchers for a new method finger-knuckle-print (FKP), which focuses on the related skin patterns of the outer surface around the phalangeal joint of ones finger. It was discovered that the finger-knuckle print (FKP) allows discrimination between...
Mobile ad-hoc network (MANET) is a collection of intercommunicating mobile hosts that dynamically forming a spontaneous network without use existing infrastructure. The mobility model represents the moving behavior of each mobile node in the MANET that should be realistic. It is a crucial part in the performance evaluation of MANET. In this paper we propose a novel performance evaluation by using...
Dans cette Note, nous montrons l'existence et l'unicite de la solution d'un probleme de frontiere libre formule en un probleme d'optimisation de forme. La demonstration de ce resultat est basee sur le principe de Schauder [6].
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.