As for software rejuvenation, there exists many policies now, including time based, measurement based, and time and measurement based policy. In this paper, the problem caused when applying time and measurement based ...
详细信息
Although Chinese companies have some level of understanding of carbon capture and storage (CCS) unit technology, the lack of knowledge and experience with technology integration mean that there is neither a true conce...
详细信息
Although Chinese companies have some level of understanding of carbon capture and storage (CCS) unit technology, the lack of knowledge and experience with technology integration mean that there is neither a true concept of the economics and technical possibilities nor any clear and specific steps and methods that should be taken to implement an integrated CCS project. There is also no knowledge of what legislation CCS project implementation needs to follow. Based on the assumption that CCS will be implemented in China, the guidelines for the implementation of a fully integrated CCS demonstration project is researched with the system engineering analysis methodology and a thorough explanation of the engineering system involved in CCS projects is provided. The research covers the implementation of the three major links in the CCS chain, starting from CO2 capture, CO2 pipeline transport to CO2 geological storage with careful research on the major issues involving technology, economics (in connection with capture), implementation processes, and others that must be noted. The CCS guidelines can be used as a tool in understanding how to design, operate and conduct CCS projects responsibly. The CCS guidelines can also provide needed information to engage policy makers to understand why these regulations will be needed and the advantage of preparing them simultaneously with the development of the technical capacity. (C) 2011 Published by Elsevier Ltd.
This paper is presenting an idea of applying the Scrum framework in the IT service support domain. Scrum framework is mainly used with conjunction of other agile methods in software development domain, but almost, no ...
详细信息
Synchronization and load balance are the primary problems faced by MMOG server cluster. For synchronization issue, system uses an improved algorithm for optimistic synchronization, at the same time for the contradicti...
详细信息
ISBN:
(纸本)9783037851579
Synchronization and load balance are the primary problems faced by MMOG server cluster. For synchronization issue, system uses an improved algorithm for optimistic synchronization, at the same time for the contradiction in MMOG between the growing requirements of games resource and the limited load capacity of servers, propose an efficient load balancing algorithm. Experimental results show that the cluster system has higher performance and load balancing capabilities.
Instead of traditional mechanical tape, A new type digital broadcast system on passenger train is introduced, It adopt the microcontroller technology and MP3 decoder method,complete the whole function of broadcast sys...
详细信息
ISBN:
(纸本)9783037851579
Instead of traditional mechanical tape, A new type digital broadcast system on passenger train is introduced, It adopt the microcontroller technology and MP3 decoder method,complete the whole function of broadcast system. The design of hardware and software is described. Its application in the broadcast system is also introduced. The system has been produced on a small scale. Its implementation in a passenger train is successful and effective.
In this paper, we present the design and implementation of OTP-DEF, a kernel extension to protect web servers against application layer DDoS attacks. OTP-DEF provides authentication by using OTP-based tests, which is ...
详细信息
ISBN:
(纸本)9783037851319
In this paper, we present the design and implementation of OTP-DEF, a kernel extension to protect web servers against application layer DDoS attacks. OTP-DEF provides authentication by using OTP-based tests, which is different from other systems that use graphical tests. First of all, according to the load of web server, an OTP-DEF web-server should fall into one of three following modes: normal, suspected attack or confirmed attack mode, and the OTP-DEF authentication mechanism shall only be activated when web-server is in suspected attack mode. Secondly, we use OTP as our puzzle, which can automatically change at the certain time interval. It makes our proposal can defend socially-engineered attack, copy attacks, replay attacks and Brute-Force Attack. Thirdly, OTP-DEF uses an intermediate stage to identify the FP addresses that ignore the test, and persistently bombard the server with requests despite repeated failures at solving the puzzles. These machines are zombies because their intent is to congest the server. Once these machines are identified, OTP-DEF blocks their requests, turns the tests off, and allows access to legitimate users who are unable or unwilling to solve tests. Finally, OTP-DEF requires no modifications to client software.
Vegetation monitoring is one of the major applications of polarimetric synthetic aperture radar (PolSAR). In this paper, permittivity estimation method for vegetation by using multi-angle polarimetric radar is propose...
详细信息
This paper emphasizes the role of contextual information and legal rules in publishing services, formulating contracts, discovering services, and their impact on ranking and adaptability. We use ConfiguredService conc...
详细信息
With the current domestic software outsourcing business with Japan's rise of a large number of outsourcing projects from Japan such as NEC, Hitachi, Toshiba and other large Japanese companies over billing, not onl...
详细信息
ISBN:
(纸本)9783037851517
With the current domestic software outsourcing business with Japan's rise of a large number of outsourcing projects from Japan such as NEC, Hitachi, Toshiba and other large Japanese companies over billing, not only promoted the growth of the domestic economy, but also led to domestic software improve the overall business. In Dalian, the Dalian City party committee and government attach great importance to the development of the software industry, software industry has become the revitalization of old industrial bases to accelerate the economic development of Dalian's one of the important strategies. However, orders easier to do a single hard, if we really want Japan to do a good job outsourcing, is not so simple. How to make the project successful? In the process of the project will encounter those problems? What is the project's impact? These issues will be troubled by the development of each project managers. These are the risks of the project, how to effectively manage the risks, the success of the project is to explore the theme of this article.
We proposed a definition of transparency in software development to improve communication among stakeholders. The notion of transparency is important, because it enables stakeholders to identify and understand the inf...
详细信息
We proposed a definition of transparency in software development to improve communication among stakeholders. The notion of transparency is important, because it enables stakeholders to identify and understand the information exchanged during communication. We designed a survey to gather evidence to support or refute our beliefs about transparency in software development. We discovered a superiority bias in our respondents when answering questions regarding communication problems. In this paper, we present our survey design and preliminary results of our survey.
暂无评论