• No results found

replica placement

An Approach for  Replica Creation & Replica Placement using MCDM

An Approach for Replica Creation & Replica Placement using MCDM

... so replica creation & its placement to right place is important for the system performance & decrease the latency of the application deployed over the ...that replica which is geographically ...

7

A Dynamic Replication Mechanism for Data Grid Federation Systems, Based on Replica Placement Cost

A Dynamic Replication Mechanism for Data Grid Federation Systems, Based on Replica Placement Cost

... handle replica placement decision (Chang, Chang, & Wang ...for replica placement on the individual regions of the DGF systems, as reported by Park, Kim, Ko, & Yoon, (2003), while ...

5

Replica placement with latency constraints in content distribution networks

Replica placement with latency constraints in content distribution networks

... optimal placement problem for general-graph topology is strictly N P -complete, whereas for tree topology the solution can be obtained in polynomial time when taking into consideration the read, write, and storage ...

7

Replica placement to mitigate attacks on clouds

Replica placement to mitigate attacks on clouds

... Clouds are changing the surface of information technolo- gies. As a consequence, the concentration of resources in the same region, network, or even machine poses an evi- dent challenge to designers of dependable ...

13

A Survey of Dynamic Replication Strategies for Improving Response Time in Data Grid Environment

A Survey of Dynamic Replication Strategies for Improving Response Time in Data Grid Environment

... as Replica Consistency Service ...for replica placement ...best replica provider for transferring the needed data set and increase the storage device ...stores replica in appropriate ...

25

Dynamic Replica Management for Data Grid

Dynamic Replica Management for Data Grid

... for replica placement so network latencies are ...placing replica of a file at a site that is connected to its neighbors with limited bandwidth and if its request for that file is above ...

5

‘Spreading Your Wings’ : International work placement research : Final report

‘Spreading Your Wings’ : International work placement research : Final report

... The placement lead highlighted her role in deciding whether to allow individual students to pursue an international placement. Currently this decision is her sole responsibility, albeit a decision which is ...

34

Selfish Less Replica Allocation in MANET

Selfish Less Replica Allocation in MANET

... In the existing strategies [2][4][8][13] there is still having a problem of selfish nodes which creates problem in accessing data and slow down the network performance. And also they are considering partial selfish nodes ...

5

Theoretical Approaches to the Characterization of Water, Aqueous Interfaces, and Improved Sampling of Protein Conformational Changes

Theoretical Approaches to the Characterization of Water, Aqueous Interfaces, and Improved Sampling of Protein Conformational Changes

... selected replica for 10 ...a replica to move from 273 to 600 K, which is consistent with ...the replica goes from 273 to 600 and back in about 10 ...

102

Dfinity  Consensus,  Explored

Dfinity Consensus, Explored

... Invariant II. We have already discussed that, if the leader is honest, its block will get certified. If the leader is Byzantine, however, it may send its block to some but not all replicas, or send multiple equivocating ...

6

HaRD: a heterogeneity-aware replica deletion for HDFS

HaRD: a heterogeneity-aware replica deletion for HDFS

... Current replica management systems adapt the replication factor for ‘hot’ data in order to increase the data locality and achieve better performance, while keeping fewer copies for less frequently accessed ...that ...

21

Fast Detection Of Replica Node In Mobile Sensor Network

Fast Detection Of Replica Node In Mobile Sensor Network

... We have proposed a replication detection scheme for mobile sensor networks based on the SPRT. We have analytically demonstrated the limitations of attacker strategies to evade our detection technique. In particular, we ...

5

Knowledge based Replica Management in Data Grid Computation

Knowledge based Replica Management in Data Grid Computation

... all replica management related functions. For the implementation of replica manager we purposes SOAP (Simple Object Access Protocol) based system that replicate the required information gained from ...

8

Comparison Of Various Writing Characteristics Of Hindiand Marathi Languages Of Devanagari Origin

Comparison Of Various Writing Characteristics Of Hindiand Marathi Languages Of Devanagari Origin

... In this study, the examination of handwritten samples of 50 writers was carried out by analyzing their general and individual writing characteristics for arriving at a definite opinion regarding their authorship. The ...

5

A Primary Shift Protocol for Improving Availability in Replication Systems

A Primary Shift Protocol for Improving Availability in Replication Systems

... underlying replica creates a new local object in its local store and triggers other replicas to create copies of this object in their local ...a replica to ...

8

Fixed Width Replica Redundancy Block Multiplier

Fixed Width Replica Redundancy Block Multiplier

... Abstract— In this paper, we propose a fixed-width multiplier design by using versatile noise tolerant ANT architecture that helps to build fixed-width multiplier with reduced precision replica redundancy block ...

6

Physical Design Implementation of Single Core 32 Bit RISC Processor on 28nm Technology

Physical Design Implementation of Single Core 32 Bit RISC Processor on 28nm Technology

... layout assembling and connectivity of digital logic gates as per the design input file (called as netlist) of an Integrated chip say a processor, by meeting the design specifications like timing, power and area. Here in ...

6

UNIVERSAL IDENTIFICATION OF LOCATION SERVICE

UNIVERSAL IDENTIFICATION OF LOCATION SERVICE

... Each node maintains a compressed image of the whole system: in the limit, one digest for each node in the system. Assuming 500 million replicas and digests sized at 2 bytes per entry, one node needs 1 GB to represent the ...

6

Charting the replica symmetric phase

Charting the replica symmetric phase

... Beyond the examples treated explicitly in Section 2.3 there are several other important and well-studied models that also satisfy the assumptions of our main results. For instance, Bapst, Coja-Oghlan and Raßmann [16] ...

62

Application of the Method of Least Squares to a Solution of the Matched Field Localization Problem with a Single Hydrophone

Application of the Method of Least Squares to a Solution of the Matched Field Localization Problem with a Single Hydrophone

... We next consider a 0.5 second duration, 100 Hz bandwidth, LFM source signal sweeping from 75 Hz to 175 Hz. Figures 3.9 and 3.10 show the results and more of the localizers were successful in this case. Our localizer and ...

121

Show all 2796 documents...

Related subjects