High availability (Total 232727 Papers Found)

in the economic, social, and cultural landscape over the past two years, it appears that we in the branding and design communities could be at a crossroads in our practices. In a world where consumers are less consumed with consuming, we ask ourselves, how exactly did we get here, and what’s next? While in some respects the collapse of the global economy appears to be responsible for the dramatic shift in consumer behavior—decreasing consumption, saving more, searching for the best value, an ...
a r t i c l e i n f o Keywords: Mobile services eWOM Trust transfer Web-mobile service transition Entitativity Technology acceptance Success in web services cannot promise the success in corresponding mobile services. To understand the mobile service adoption behavior under the context of web–mobile service transition, this study, taking mobile eWOM services as an example, investigates the role of trust in mobile service adoption and empirically examines the trust transfer mechanism. Specifica ...
The increasing popularity of specialized Internetconnected devices and appliances, dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns. Unlike traditional web browsers, many IoT devices have always-on sensors that constantly monitor fine-grained details of users’ physical environments and influence the devices’ network communications. Passive network observers, such as Internet service providers, could potentially analyze IoT network traffic to infer ...
Ammonium sulphate is a major component of the air pollutants deposited on forests in the Netherlands. Different amounts of NH4 + were added to Douglas-fir seedlings grown in tall containers of sand, to study the influence of high concentrations of NH4 + in the soil on the development of fine roots and the effects of nitrogen uptake on rhizosphere pH. At the end of this eight-month experiment part of the ammonium appeared to have nitrified into nitrate. High doses of ammonium negatively affected ...
Elevated CO2 has been shown to stimulate plant productivity and change litter chemistry. These changes in substrate availability may then alter soil microbial processes and possibly lead to feedback effects on N availability. However, the strength of this feedback, and even its direction, remains unknown. Further, uncertainty remains whether sustained increases in net primary productivity will lead to increased longterm C storage in soil. To examine how changes in litter chemistry and productivi ...
The gateways in mobile cellular networks are capable to handle the traffic from millions of subscribers at the same time, while providing high availability guarantee. Such entities are not only expensive, but also inflexible in terms of system deployment and maintenance. In this work, we investigate the feasibilities to virtualize gateway entities used in the Long Term Evolution (LTE) Evolved Packet Core (EPC). We propose a novel PDN Gateway (PGW) architecture, which decouples the control plane ...
Mobility management is an essential element of wireless communications. It is the key to enabling always-on wireless connectivity to mobile users. With the advance of the next generation broadband wireless technologies and different network architecture evolution options, the capability to achieve fast and seamless handoff is a critical factor in evaluating the success of a new technology and the efficiency of the network architecture. This paper addresses the possible handoff solutions to new b ...
1. This study describes the structure and functional significance of numerous song dialects in island populations of Darwin's finches from the Galápagos Archipelago. 2. The following acoustical information was obtained from tape recordings made in the islands: a. For songs: Frequency bandwidth, relative amplitude distribution according to frequency, and absolute sound pressure levels (dB). b. For the environment: Attenuation characteristics of a broadband frequency spectrum (“pink” noise) b ...
The composition of the gaseous environment within tissue culture vessels is a critical factor in determining in vitro plant growth and morphogenic responsiveness. Consequently, the provision of an adequate and sustainable oxygen supply for cultured plant cells (including isolated protoplasts), tissues and organs is a crucial prerequisite for optimization and regulation of such cultural responses. During the past decade, research has focused on improving growth and development using artificial ga ...
1 Abstract— Availability is one of the important factors to be considered for business-driven IT service management. This paper addresses the issue of analyzing what we call availability weak-points in an SOA deployment framework, leveraging workflow definitions to specify the high availability requirement at the business process level. In our weak-point analysis framework, we present an effective analysis methodology to calculate the optimal high availability solution with minimum cost, while ...
This study examined the effect of nitrogen source and iron availability on growth rates, electron transport system (ETS) activity and growth efficiency for the marine gamma-proteobacterium Vibrio harveyi. We found that all 3 parameters increased with increasing iron concentration and varied as a function of nitrogen source (amino acids, ammonium, and nitrate). At low iron concentrations, growth rates were highest and lowest in the amino acid and nitrate media, respectively. Rates were similar fo ...
Data-intensive cloud computing offers an abstraction of high availability, usability, and efficiency while processing petabytes of data. As individual users do not have sole control on cloud resources, it may lead to concerns regarding the trustworthiness of the resources used. In this paper, we propose a trustworthiness analysis framework that adapts software attestation mechanisms and heartbeat messages to evaluate the current status of virtual machine in cloud computing to know trustworthines ...
WEBGIS is the latest advances in GIS technologies that bring spatial information via Internet. Access to spatial data over the Internet is growing rapidly and Information sharing through GISWEB Server is important as it reduces cost of data, provide standard data, conformity of data and data interoperability. WEBGIS Server architecture development includes three main parts. They are hardware architecture, software architecture and data warehouse. Hardware architecture is a design based on enabli ...
We explored the social and gaming attributes of interactive casual gaming on mobile phones. To do so, we developed a game called MoMENTus, a multiplayer mobile brain teaser game, and deployed it to 43 participants, divided into various multiplayer and team configurations, over the course of one week. Participants generally liked the interactive and mobile aspects of our casual game, while the team concept was unexpectedly less compelling. Our results suggest that mobile multiplayer casual gaming ...
1 works are in a state of transition from being primarily concerned with the ing the exchange of a variety of information types. Currently the industry in reached the level of 2 generation phones. It is predicted that over the next hnological developments will shift the telecommunications industry through ndwidth and “always on” connections) to third generation (3G) in 2002. K population now own a mobile device and this trend of increasing ue for less developed countries with 2 billion subsc ...
Recently, as needs for real-time services like financial services are ever increasing, improvement in the service quality of data communication networks in terms of availability and reliability is emerging as a critical issue. In this context, the availability, reliability, and scalability of routers that control data flow and path between networks on the data communication network are being recognized as critical problems. Many methods for improving reliability and availability to minimize loss ...
The Cloud Computing paradigm is getting popular deliberately and is being adopted in modern organizations because of its lower cost, scalability and high availability. This moves control of data from the owner to the cloud service provider and thus security and data privacy of customer or owner becomes a challenge. Cloud is a new concept and as a result of which the experience of providers in this field might not be enough to complement security. Security, being inconsistent and not robust, will ...
High availability systems typically rely on redundant components and functionality to achieve fault detection, isolation and fail over. In the future, increases in error rates will make high availability important even in the commodity and volume market. Systems will be built out of chip multiprocessors (CMPs) with multiple identical components that can be configured to provide redundancy for high availability. However, the 100% overhead of making all components redundant is going to be unaccept ...
Only a decade ago, issues of replication, high availability and load balancing were the focus of small, closely coupled cluster projects. Consequently, techniques for cluster management and small replication systems are abundant. However, the advent of the Internet led to wide spread and highly decentralized access of services and content that bring issues of scale and ubiquitous deployment. In particular, the need to maintain copies of replicated data consistent grows beyond the limits of any l ...
Voice over Internet protocol (VOIP) is a fast growing technology believed to be the future replacement for traditional public switched telephone network (PSTN) networks. VOIP offers many benefits over PSTW, but there are still lots of issues when it comes to service reliability and security. One of the problems faced is how to locate communicating parties on the Internet in a secure and reliable manner. The security mechanisms included in RFC 3261 session initiation protocol (SIP) are either wea ...
Our society is increasingly dependent on service-oriented applications built from complex pieces of software. Significant questions for achieving high availability in multi-tier service architectures are: (1) Do we gain from separation of code that implements functional and non-functional requirements in a service? In particular, what are the benefits of doing the separation by implementing support for fault tolerance (FT) in the middleware? There are two extreme answers to this question: ...
The focus of this work is the on-demand resource provisioning in cloud computing, which is commonly referredto as cloud elasticity. Although a lot of effort has been invested in developing systems and mechanisms that enable elasticity, the elasticity decision policies tend to be designed without quantifying or guaranteeing the quality of their operation. We present an approach towards the development of more formalized and dependable elasticity policies. We make two distinct contributions. First ...
In this paper we present a work in progress dedicated to the recognition and prediction of mobile user activities. In contrast with related projects that generally use GPS for localization, we employ a fusion of wireless positioning methods available in current smartphones (GPS, GSM, Wi-Fi). Our positioning system offers high availability and accuracy without dedicated calibration. We demonstrate how such a positioning information can improve place extraction algorithms and enable the recognitio ...
Enterprise-level workloads, such as systems applications and products (SAP) workloads, require infrastructure with high availability, clustering, or physical server appliances, features that are often not a part of a typical cloud offering. Thus, businesses are often forced to run enterprise workloads in their legacy environments and cannot take advantage of the cloud computing flexibility, elasticity, and low cost. To enable enterprise customers to use these workloads in a cloud, we enabled a l ...
To improve text-based image retrieval system, we propose to use visual content of images to filter their textual indexing. We propose first to generate new visual feature based on entropy measure (heterogeneity), and then we address the question of feature selection in the context of mislabeled images. We compare two methods of word dependant feature selection on mislabeled images: Approximation of Linear Discriminant Analysis (ALDA) and Approximation of Maximum Marginal Diversity (AMMD). A Hier ...
LinkIntegrity+ is a web asset integrity prototype solution from the IBM Almaden Research Center in San Jose, California. It aims to significantly improve the integrity of web assets, such as, web pages, hyperlinks, images, server-side-programs and templates across multiple independent webmaster domains within a geographically distributed intranet of heterogeneous web servers. While there are many solutions that can detect broken links and missing images "after-the-fact", LinkIntegrity+ proactive ...
Objective To evaluate the clinical effectiveness, common complications and maintenance associated with hydroxylapatite (HA) coated cylindrical implants when used to support single crowns.Design A prospective medium term clinical study of the Calcitek HA-coated implant.Setting Implant placement, crown fabrication and follow-up procedures were carried out at the Leeds Dental Institute, between 1990 and 1998.Subjects and method 26 patients (33 implants) participated in the trial. They were referred ...
The presence of an on-site data clerk team proved to be a lowcost, effective method for VIIRS test data distribution. As opposed to a strictly electronic distribution path, the human data clerk component was always on-hand to obtain and organize relevant test procedure as-run documents, and various other shift logs, test logs, and test reports. It was the data clerk's responsibility to locate data, find documents, manage the data flow process, and serve any requests from the sensor scientist tea ...
Ficus is a flexible replication facility with optimistic concurrency control designed to span a wide range of scales and network environments. Optimistic concurrency control provides rapid local access and high availability of files for update in the face of disconnection, at the cost of occasional conflicts that are only discovered when the system is reconnected. Ficus reliably detects all possible conflicts. Many conflicts can be automatically resolved by recognizing the file type and understa ...
Wireless nodes such as smart-phones in which the WiFi wireless card is continuously on, consume battery energy in just a few hours. Moreover, in many scenarios, an always-on wireless card is useless because there is often no need for transmission and/or reception. This fact is exacerbated in Delay/Disruptive Tolerant Network (DTN) environments, in which nodes exchange Delay Tolerant Objects (DTO) when they meet. Power Saving Management (PSM) techniques enable the lifetime of the nodes to be exte ...
This paper is devoted to the study of a resource-constrained scheduling problem, the Process Move Programming problem, which arises in relation to the operability of certain high availability real-time distributed systems. Informally, this problem consists, starting from an arbitrary initial distribution of processes on the processors of a distributed system, in finding the least disruptive sequence of operations (non-impacting process migrations or temporary process interruptions) at the end of ...
Purpose – The paper aims at defining a systemic framework for the implementation of business continuity management (BCM). The framework is based on the assertion that the implementation of BCM should be done through the systemic implementation of an “always-on” enterprise information system. Design/methodology/approach – Systems approach is used in order to design a systemic framework for the implementation of continuous computing technologies within the concept of an always-on enterpris ...
In manufacturing industry, machines’ high availability and reliability is the key factor to make companies competitive in fierce business competition. With the increased machine’s usage and age, the machine’s reliability and performance could decline and result in failure. The unexpected failures could result in not only catastrophic losses but also security event. Preventive maintenance is an effective way to avoid unexpected failures and keep machine in good condition. It is a bridge con ...
  • Yiqun Ding, Fan Li, Bo Zhou, Wei Li, Xinyu Wang, Tong Wu,
  • 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS)
  • 2014
Traditional financial trading systems were developed in database-based standalone model years ago. Given that there exist some evident drawbacks like high latency and low availability in such architecture, it is imperative to design a new model which can meet the requirements of time-sensitive financial transactions. Therefore, in this paper we design and implement a state-replication based matching system which includes the critical technical points like order sequencing and asynchronous data p ...
A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and is always on and always accessible. Therefore, among the most salient aspect of wearable computers should be small form factor and long battery lifetime. In this paper, we have designed and implemented a low-power real-time operating system (called “eRTOS”) specialized for wearable computers. eRTOS has about 9KB footprint and is equipped with low-power techniques comp ...
A suite of 10 autonomous ozone monitoring units, each powered using renewable energy, was developed and built to study surface ozone in Antarctica during the International Polar Year (2007–2009). The monitoring systems were deployed in a network around the Weddell Sea sector of coastal Antarctica with a transect up onto the Antarctic Plateau. The aim was to measure for a full year, thus gaining a much-improved broader view of boundary layer ozone seasonality at different locations as well as o ...
This paper introduces a static Tree-based Multiple-Hop Distributed Hierarchical Agglomerative Clustering (TMH-DHAC) approach for wireless sensor networks (WSNs). The proposed TMH-DHAC is derived from the Hierarchical Agglomerative Clustering (HAC) and the distributed HAC (DHAC) methods. TMH-DHAC adopts an energy-aware cluster-head election policy to balance the energy consumption and workload among sensor nodes in the network. The multi-hop tree structure provides the near-optimal routes for int ...
......In their insightful 2000 article, Gray and Shenoy offered 22 rules of thumb for designing data storage systems. Focusing primarily on database systems, they evaluated how applications use processors, storage, and networking resources and used that information to derive ratios for balanced system design and project how technology trends would affect performance and price. A decade later, there have been significant changes in the information technology landscape. Although stand-alone databa ...
Genetic aberrations of DNA repair enzymes are known to be common events and to be associated with different cancer entities. Aim of the following study was to analyze the genetic association of rs1136410 (Val762Ala) in PARP1 gene with the risk of breast cancer using genotypic assays and insilico structural predictions. Genotypic analysis of individual locus showed statistically significant association of Val762Ala with increased susceptibility to breast cancer. Protein structural analysis was pe ...
  • ,
Accelerated product development cycles are just one symptom of an extremely competitive automotive marketplace. Companies have been driven to embrace and extend virtual product development processes, replacing time intensive physical tests with the use of upfront performance simulation. Accelerated product development cycles represent just one symptom of an extremely competitive automotive marketplace. Companies have been driven to embrace and extend virtual product development processes, replac ...
To provide high availability for services such as mail or bulletin boards, data must be replicated. One way to guarantee consistency of replicated data is to force service operations to occur in the same order at all sites, but this approach is expensive. In this paper, we propose lazy replication as a way to preserve consistency by exploiting the semantics of the service’s operations to relax the constraints on ordering. Three kinds of operations are supported: operations for which the client ...
We present a system which generates interactive high-level debugging systems from formal language definitions. The language definer has to specify a denotational semantics augmented with a formal description of the language specific debugging facilities. The generated debugger offers the traditional features such as tracing programs, setting breakpoints, displaying variables etc; interaction with the user is always on language level rather than on machine level. The concept has been implemented ...
This paper presents a simple decentralized service deployment mechanism that can be used to offer services with high availability by using contributed resources with variable, possibly very low availability. It uses little information about the state of the group, and provides best-effort results. Contributory computer systems are those where users provide their own resources to be used collectively.  Contributory applications are complex to build, as they have to deal with issues li ...
This paper describes the implementation of the mechanisms used to achieve a high level of availability in the SIR-S system through a duplicated Master-Slave configuration. In case of a fault in the Master Node, the Slave Node can carry on the operations as close as possible to the scheduled sequence, in order to match the time optimization criteria with a maximum overall delay of about 5 msec. transfer transparently data between ground and aircraft in both directions (Fig. 1). The RPCM is the ma ...
This study focused on an artificial immunity-enhancing module for high-availability servers against cyberattacks on the internet. Similar to the human immune system, an artificial immunity-enhancing module consists of innate and adaptive immune functions. The innate immune function detects cyberattacks on a known or unknown vulnerability of a server application, although this function causes to restart the server application to recover its execution control. The adaptive immune function adaptive ...
  • ,
Computer games is a multidisciplinary area that presents an exponentially growing impact on the economy, creating huge business opportunities generating large investments and large returns, new employment opportunities for professionals of several areas, from designers to programmers, from psychologists to mathematicians, from managers to politicians, from marketers to investors; increasing offer of graduation and post-graduation studies by universities worldwide. This domain claims for new prof ...
In highly competitive, globalized economies and societies of always-on-line people intensively using the Internet and mobile phones, public administrations have to adapt to new challenges. Enterprises and citizens expect public administrations to be agile and pro-active to foster development. A way to achieve agility and pro-activity is application of a model of Collaborative Network Organizations in its two forms: Virtual Organizations (VO) and Virtual Organization Breeding Environments (VOBE). ...
Miniaturized computing platforms typically operate under restricted battery capacity due to their size [1]. Due to low duty cycles in many sensing applications, sleep-mode power can dominate the total energy budget. Wakeup timers are a key always-on component in such sleep modes and must therefore be designed with aggressive power consumption targets (e.g., <;10nW). Also, accurate timing generation is critical for peer-to-peer communication between sensor platforms [1]. Although a 32kHz cryst ...