Sciweavers

405 search results - page 35 / 81
» Modelling dependencies of IT Infrastructure elements
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
Establishing how many VoIP calls a wireless LAN can support without performance degradation
The use of Voice IP (VoIP) over wireless local area networks (WLAN) is a topic of great interest in the research arena. This paper attempts to answer the question: how many VoIP c...
Ángel Cuevas Rumín, Eur Ing Chris Gu...
JDCTA
2010
172views more  JDCTA 2010»
14 years 4 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
CCGRID
2007
IEEE
15 years 4 months ago
Optimizing jobs timeouts on clusters and production grids
This paper presents a method to optimize the timeout value of computing jobs. It relies on a model of the job execution time that considers the job management system latency throu...
Tristan Glatard, Xavier Pennec
APSEC
2000
IEEE
15 years 2 months ago
Survivability Analysis of Networked Systems
Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. Ensuring system survivability has increased...
Jeannette M. Wing
ERCIMDL
2007
Springer
74views Education» more  ERCIMDL 2007»
15 years 1 months ago
Named Entity Identification and Cyberinfrastructure
Well-established instruments such as authority files and a growing set of data structures such as CIDOC CRM, FRBRoo, and MODS provide the foundation for emerging, new digital servi...
Alison Babeu, David Bamman, Gregory Crane, Robert ...