The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Byzantine fault is the fault that can make the components behave arbitrary and may cause disastrous results. With the increasing malicious attacks and software errors, Byzantine fault tolerance has begun to draw more attention it deserves. Previous Byzantine fault tolerant algorithms have strong assumption that all the replicas is synchronous and do not support replicated calling services, which make...
This article proposes an optimization model for the LTE RAN network planning that aimed to accounting of services multi-period planning. The analysis of experiments results showed that formulation of the problem, which is shown in paper and presented as a problem of MILP, allows to obtain the correct solutions from the practical point of view. Comparison of the result showed that usage of multi-period...
In this paper, a services application system will be designed base on the P2P overlay network. Through the use of the system, users can easily search for the services they need, and assembled the searched services into the application process, and it can achieve the desired application through the implementation of the application process. Other users can also use local services, the service of users...
The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering locality. We place anomaly detection algorithms that used in snorts in form of services within verified servers. The major advantage of this method is that the former snort strategies...
So far, methods of fault diagnosis have been numerous. But as the complexity of modern equipment, the variability of fault, as well as trends in global manufacturing, it is difficult for any separate organization of independent to complete all the work of fault diagnosis. This article reviewed the equipment fault diagnostic technology in the course of development, in particular, remote fault diagnostic...
The reliability of service is related to the kind and the number of service resources in grid. The kind and the number of service resources often change, so the service reliability is variable. In this paper, we propose a reliability measurement model for service in grid, which is based on the dynamic characteristic of service resource. In this model, the dynamic state of service is divided into a...
Internet-scale services need new design patterns and programming models for the partitioned data set with many copies that are changed independently. This is a huge software challenge. Big Web sites spend 70% of their efforts on undifferentiated heavy lifting (e.g., partitioning, replication and scaling) versus 30% on differentiated value (feature) creation. This talk will review the challenges for...
We have formed the STARS Alliance to address alarming declines in computing enrollments and the need to broaden participation in computing. Our innovative STARS Leadership Corps engages college students in a community dedicated to giving back, persevering, and striving for excellence. The successful Corps model incorporates best practices in recruiting and retention in computing, including student...
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrastructure through web services. With cloud computing, the aim is to hide the complexity of IT infrastructure management from its users. At the same time, cloud computing platforms provide massive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.