Filters








10 Hits in 20.3 sec

Cloud monitoring: A survey

Giuseppe Aceto, Alessio Botta, Walter de Donato, Antonio Pescapè
2013 Computer Networks  
However, to the best of our knowledge, these surveys lack a detailed analysis of monitoring for the Cloud. To fill this gap, in this paper we provide a survey on Cloud monitoring.  ...  The number of Cloud-based services has increased rapidly and strongly in the last years, and so is increased the complexity of the infrastructures behind these services.  ...  Programme, and Google Faculty Award for the UBICA project. We thank the Editor and the anonymous reviewers for the valuable comments that helped improving the manuscript.  ... 
doi:10.1016/j.comnet.2013.04.001 fatcat:tyj3tg6lm5h5honl5dg5lf4htq

JSE 32:3 Fall issue Whole Issue PDF

Kathleen E. Erickson
2018 Journal of Scientific Exploration  
Acknowledgments Special thanks to IKY, the State Scholarship foundation in Greece, for fi nancial support of this doctoral thesis research. References Cited Adler, M. P., Le Mouel, J.  ...  ., & Zlotnicki, J. (1999) Acknowledgments We thank the 4 astrologers for participating in the study and doing the interpretations out of academic interest without seeking any remuneration.  ...  This study found a moderate agreement in the prediction of the presence of mental illness and substantial agreement with regard to prediction of the current state of illness.  ... 
doaj:ba637eb7d67948b598be8f6190968afb fatcat:sklb5szukzdtzdlh4t633qvqda

Foreword of Special Issue on "Nomadic Services and Applications"

Jason C. Hung
2011 Journal of Networks  
the mobile experience of co-presence, and thus to achieve the effect user moving in the physical space and interacting with the of cooperation.  ...  Finally, we made a brief could interact with computer game without mouse and conclusion in section V. keyboard.  ... 
doi:10.4304/jnw.6.5.687-688 fatcat:3qws6kqycnffxnh6n6th6ioc5a

Consistency in Distributed Systems [chapter]

Reliable Distributed Systems  
This report documents the program and the outcomes of Dagstuhl Seminar 13081 "Consistency in Distributed Systems." Seminar 18.-22.  ...  This seminar brought together researchers and practitioners in the areas of distributed systems, programming languages, databases and concurrent programming, to make progress towards the abovmentioned  ...  The positive construction relies on generalized lattice agreement. In lattice agreement, each replica may propose a value and when it does so waits for a majority of replicas to respond.  ... 
doi:10.1007/0-387-27601-7_19 fatcat:g7klyryx4zggzo47wg2etjdxk4

Transactional memory: Architectural support for lock-free data structures

Maurice Herlihy, Jeannette Wing
2012 ACM Transactions on Programming Languages and Systems   unpublished
In order to ensure a common understanding between the different research communities that the workshop brings together, the seminar started with a few tutorials from the perspective of each community.  ...  We believe that such principled approaches will become increasingly critical to the design of scalable and correct distributed applications.  ...  The positive construction relies on generalized lattice agreement. In lattice agreement, each replica may propose a value and when it does so waits for a majority of replicas to respond.  ... 
fatcat:4bk5shjlrvge5hjtlgb3ui46ai

COMPLETE ISSUE

Lectito Press Office
2019 Feminist Encounters A Journal of Critical Studies in Culture and Politics  
We hope for productive agreement and disagreement, and the shared struggle of fighting gender oppression, with our minds, hearts, and bodies, as the times demand.  ...  Founded in 2017, Feminist Encounters is a journal committed to argument and debate, in the tradition of historical feminist movements.  ...  ACKNOWLEDGEMENTS This is to express my grateful thanks to Sally R Munt, the Chief Editor of Feminist Encounters, and the editorial team at Lectito, for their assistance throughout the process of compiling  ... 
doi:10.20897/femenc/5928 fatcat:wrepujba2fc7dhjwewoplwxnj4

A short history of nearly everything

2003 ChoiceReviews  
It was rather as if someone working today were to announce that he had found the ancestral bones of humans in, say, Missouri. It just didn't fit with what was known.  ...  Even his chosen name, Australopithecus, showed a lack of scholarly application, combining as it did Greek and Latin roots. Above all, his conclusions flew in the face of accepted wisdom.  ...  In the early days of the British Museum, prospective visitors had to make a written application and undergo a brief interview to determine if they were fit to be admitted at all.  ... 
doi:10.5860/choice.41-1524 fatcat:sabzor7alnhrbnfsybsryywsrq

An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card

Anton Železnikar, Chiu-Hsiung Liao, Hon-Chan Chen, Ching-Te Wang
2009 unpublished
The protocol provides not only mutual authentication between a user and the remote server but also achievement of key agreement.  ...  The protocol also supports convenient password update at the user's terminal. To avoid the identity duplication, we introduce the idea of transformed identity in our protocol.  ...  This work has been supported by the Ministry of Science, Education and Sports, Republic of Croatia, under the grant No. 036-1300646-1986 and 098-0982560-2563.  ... 
fatcat:gxlnopax35glfnfjsbsxgkcija

Towards a Comprehensive Evidence-Based Approach For Information Security Value Assessment

Daniel Schatz
2018
In the first step, we address the identified terminology gap to clarify the meaning of 'cyber security' by analysing authoritative definition sources in the literature and presenting an improved definition  ...  The key components of this framework such as the business environment, drivers (threat landscape, legal and regulatory) and challenges (cost of security, uncertainty) are found to be a crucial part of  ...  We provide a discussion and two brief case studies to illustrate the application of the presented model.  ... 
doi:10.15123/pub.7950 fatcat:xwzgweyff5fhbe4kxsexnx5zjq

People Capability Maturity Model (P-CMM) Version 2.0

William Curtis, William A. Hefley, Sally A. Miller
2018
The Software CMM has been used by software organizations around the world for guiding dramatic improvements in their ability to improve productivity and quality, reduce costs and time to market, and increase  ...  development with process improvement, and establish a culture of excellence.  ...  In addition to providing technical insights, they have helped focus our efforts and have worked with us to evaluate and plan the initial development of Version 1 of the People CMM.  ... 
doi:10.1184/r1/6581879 fatcat:usfwml7bsfeebbujq3bdrg2pli