NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

16 17 18 19
zadetkov: 184
171.
  • Estimating Error-probabilit... Estimating Error-probability and its Application for Optimizing Roll-back Recovery with Checkpointing
    Nikolov, D.; Ingelsson, U.; Singh, V. ... 2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications, 2010-Jan., 2010
    Conference Proceeding
    Odprti dostop

    The probability for errors to occur in electronic systems is not known in advance, but depends on many factors including influence from the environment where the system operates. In this paper, it is ...
Celotno besedilo

PDF
172.
Preverite dostopnost
173.
  • いま,わが国のマラリア対策が志向するところ いま,わが国のマラリア対策が志向するところ
    狩野, 繁之 医療, 2000/04/20, Letnik: 54, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    新興・再興感染症の時代にあって, マラリアは国内における防疫上大いに関心を払ってしかるべき疾患であると同時に, 国際医療協力においてその流行対策をはからねばならない疾患でもある. たとえばマラリアによる国内死亡者が毎年でているなか,「感染症新法」の下, 単なる発生動向調査のみを行えばよい疾患とは考えられない. 国内に流通する抗マラリア薬の整備を含めた診断治療体制の確立や, ...
Celotno besedilo
174.
  • CURRENT TOPICS TOWARDS THE ... CURRENT TOPICS TOWARDS THE CONTROL OF MALARIA
    KANO, Shigeyuki Japanese Journal of National Medical Services, 2000, Letnik: 54, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Malaria is one of the most devastating diseases in the context of emerging and re-emerging infectious diseases. We have to be fully prepared for the introduction of the disease into Japan under ...
Celotno besedilo
175.
  • Using directed graphs to de... Using directed graphs to describe entity dependency in stable distributed persistent stores
    Jalili, R.; Henskens, F.A. Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences, 1995, Letnik: 2
    Conference Proceeding
    Odprti dostop

    In a persistent object store, the acts of modifying data and reading modified data result in the creation of dependencies between the modifying process and the data. Dependencies may be represented ...
Celotno besedilo

PDF
176.
  • Checkpointing Systems Checkpointing Systems
    Wolter, Katinka Stochastic Models for Fault Tolerance, 2010
    Book Chapter

    Checkpointing applies to large software systems subject to failures. In the absence of failures the software system continuously serves requests, performs transactions, or executes long-running batch ...
Celotno besedilo
177.
  • Failure transparency in rem... Failure transparency in remote procedure calls
    Ravindran, K.; Chanson, S.T. IEEE transactions on computers, 08/1989, Letnik: 38, Številka: 8
    Journal Article
    Recenzirano

    A model of remote procedure call (RPC) which reflects certain generic properties of the application layer that can be exploited by the RPC layer during failure recovery is presented. A technique of ...
Celotno besedilo
178.
Preverite dostopnost
179.
  • A watchdog processor based ... A watchdog processor based general rollback technique with multiple retries
    Upadhyaya, J. S.; Saluja, K. K. IEEE transactions on software engineering, 1986-Jan., 1986, 1986-01-00, 19860101, Letnik: SE-12, Številka: 1
    Journal Article
    Recenzirano

    A common assumption in the existing rollback techniques is that transients, the cause of most failures, subside very quickly, implying that a single story retry of the program from the previous ...
Celotno besedilo
180.
Celotno besedilo
16 17 18 19
zadetkov: 184

Nalaganje filtrov