scispace - formally typeset
Search or ask a question

Answers from top 16 papers

More filters
Papers (16)Insight
Always-on, server-side monitoring, like that provided by the Lustre Monitoring Tool, permits a comprehensive and nonintrusive mechanism for capturing details of the I/O workload.
The server provides maximum uptime (99.999%) for end users while ensuring the transactional integrity of all clinical PACS data.
Radio uptime and power consumption measurements in an experimental testbed confirm the achieved benefits.
Open accessBook ChapterDOI
Arie Gurfinkel, Marsha Chechik 
19 Citations
verification can be supplemented by a more precise but much more expensive thorough check, but it is not clear how often this check really helps.
It can publish service functions by the map of ArcGIS Server, which makes it convenient to check the real-time status of each bus.
Therefore, when a contract is defined between the client and the server, its execution has to be monitored to check if expected temporal properties are respected.
They show that: (i) uptime is not a leading indicator of downtime; (ii) downtimes and uptimes are not importantly related in the same period, and (iii) each CNC machine downtime has a forward effect on the uptime; however, influence is delayed from 1 to 7 downtime periods.
By selecting an appropriate server: (i) we can guarantee a high perceived quality to the user and (ii) reduce the server response time.
Open accessProceedings ArticleDOI
Dustin Anderson, Eric J. Korpela, R. Walton 
05 Dec 2005
181 Citations
We present measurements of the CPU time and disk I/O used by a BOINC server, and show that a server consisting of a single inexpensive computer can distribute on the order of 8.8 million tasks per day.
To be most useful, this remote server also should provide some way for users to check the fit of their models, without disclosing actual data values.
Proceedings ArticleDOI
12 Jun 2007
73 Citations
We show performance varies greatly depending on the server scenario and how the protocol is used.
Proceedings ArticleDOI
E. Gabber, Henry F. Korth 
23 Feb 1998
24 Citations
This is particularly advantageous in applications requiring "24/spl times/7" uptime.
We also show that the idle periods detected by our system constitute half of the system uptime.
Using our measurements, we propose a new metric for availability that goes beyond the traditional sole measure of uptime.
We highlight how dual-stack servers can be utilized to reduce server-to-server latencies by up to 50 ms. Our results indicate that significant daily oscillations in end-to-end RTTs of server-to-server paths is not the norm, but does occur, and, in most cases, contributes about a 20 ms increase in server-to-server path latencies.
Proceedings ArticleDOI
Tarek Abdelzaher, Chenyang Lu 
12 Dec 2000
106 Citations
We demonstrate that a general Web server may be modeled as a linear time-varying system, describe the equivalents of sensors and actuators in that system, formulate a simple feedback loop, describe how it can leverage on real-time scheduling theory to achieve timing guarantees, and evaluate the efficacy of the scheme on an experimental testbed using a real Web server (Apache), which is the most popular Internet server today.

See what other people are reading

How does the design of a user-centric Sabah tourism website affect the overall user experience for Japanese visitors?
5 answers
The design of a user-centric Sabah tourism website significantly impacts the overall user experience for Japanese visitors. Research indicates that Sabah's core tourism products, including marine resources and cultural diversities, contribute to the state's tourism image, emphasizing the importance of a well-designed website. Creative and innovative technology, such as user-centered design methods, plays a crucial role in enhancing the effectiveness and efficiency of tourism websites, ensuring up-to-date information delivery for optimal user satisfaction. Moreover, the visibility and web information richness of hotel websites in Sabah are essential for attracting travelers, highlighting the significance of a user-friendly and search engine optimized website for a positive user experience. Overall, a user-centric design approach incorporating innovative technology is vital for creating a seamless and engaging experience for Japanese visitors exploring Sabah's tourism offerings.
What are the problems with internet of things?
5 answers
The Internet of Things (IoT) faces several challenges, including security and privacy issues. These problems stem from factors such as inadequate device updates, user inexperience, lack of strong security measures, and unreliable device tracking. Researchers have highlighted concerns like outdated components in devices, disclosure of sensitive information, and devices configured with insecure default settings. To address these issues, proposed solutions include implementing security agreements, developing layered security models, and utilizing SSL certificates for secure data transfer between IoT devices. The vulnerabilities identified in IoT systems, such as webcams with outdated components and devices with default passwords, underscore the urgent need for robust security measures and standardized protocols in IoT environments.
How does patient empowerment contribute to the development of gaslighting behaviors among healthcare providers?
5 answers
Patient empowerment can inadvertently lead to the development of gaslighting behaviors among healthcare providers. While patient empowerment aims to enhance patient engagement and decision-making, it can create challenges when patients pressure providers for specific treatments or medications, potentially leading to conflicts and manipulation. Barriers at both individual and organizational levels can hinder patient empowerment initiatives, resulting in value co-destruction and strained relationships between patients and healthcare professionals. These challenges may push healthcare providers towards gaslighting behaviors as they navigate conflicting expectations and diverging goals in co-planning and delivering healthcare services. Therefore, understanding and addressing these barriers are crucial to prevent the negative consequences of patient empowerment on healthcare provider behaviors.
How does the inclusion of Alfin or information literacy in university curricula impact students' overall success and career prospects?
8 answers
The inclusion of ALFIN or information literacy (IL) in university curricula significantly impacts students' overall success and career prospects by fostering critical thinking, enhancing research skills, and improving academic performance. Research indicates that students with higher proficiency in IL demonstrate better success in higher education, as their ability to effectively search for and utilize information sources positively influences their academic achievements. This proficiency is crucial for students' independence, critical selection of information sources, and ethical use of information, which are key competencies for professional development. Furthermore, the integration of IL into curricula through collaborative efforts between academic libraries and scholarly communities enhances students' engagement with IL training, which is considered a strategic task in academic institutions. Such training, when not compulsory, benefits from the support of university leadership and the practical implementation by scholarly departments, highlighting the importance of institutional backing in the effectiveness of IL education. The development and implementation of IL competencies in university settings, as seen in projects aimed at improving learning resources using new technologies, demonstrate the necessity of collaborative work between librarians and teachers to promote the development of information skills among college students. This collaboration is essential for embedding IL into the curriculum and ensuring that students are equipped with the skills needed for academic and professional success. Moreover, the practical application of IL in university curricula, through initiatives like integrating learning communities and action research, has shown the feasibility of enhancing active learning and continuous improvement upon learning processes. Such initiatives not only prepare students for academic success but also for their future careers by encouraging the creation of new knowledge and ethical interaction with information. In summary, the inclusion of ALFIN or IL in university curricula plays a pivotal role in students' academic and professional trajectories by equipping them with essential skills for critical thinking, effective research, and ethical information use, thereby enhancing their overall success and career prospects.
What are the legal requirements for secure payment processing in the travel industry?
5 answers
Legal requirements for secure payment processing in the travel industry involve various aspects. Firstly, a payment system may utilize replacement account identifiers to enhance security and privacy. Secondly, a processing device with biometric capabilities may be employed to authenticate payments, ensuring secure transactions. Additionally, methods and systems may be implemented to authenticate payment information for travel bookings, ensuring payment confirmation before ticket issuance. Furthermore, secure payment transactions may involve verifying identities, generating authorization codes, and matching requested payments with authorization codes to proceed with transactions. Lastly, compliance with data security requirements is crucial, ensuring that agents processing transactions for merchants meet specific criteria, such as valid account information and unique identifiers. These measures collectively contribute to meeting legal standards for secure payment processing in the travel industry.
How does exercise benefit?
5 answers
Exercise provides a multitude of benefits across various aspects of health and well-being. Regular physical activity not only helps in preventing diseases like cardiovascular diseases, diabetes, and obesity, but also plays a crucial role in improving mental health by reducing stress, anxiety, and depression. Additionally, exercise has been linked to delaying the development of cardiovascular diseases, improving cardiorespiratory fitness, and enhancing muscle strength and body composition. Furthermore, the genetic interaction with exercise highlights the personalized benefits individuals can derive from tailored exercise regimens. Encouraging individuals to engage in physical activity at all levels is essential to maximize the benefits, as even small increases in exercise levels can lead to significant improvements in overall health and quality of life.
How can internet of things help an athletes mental health?
4 answers
The Internet of Things (IoT) plays a crucial role in monitoring athletes' mental health by utilizing wearable devices and real-time data analysis. IoT technology enables the continuous tracking of physiological and psychological parameters during training and competitions. By integrating IoT devices like fitness bands and smartwatches, athletes' mental health can be assessed through factors such as step count, sleep patterns, and physical symptoms, aiding in the early detection of declining mental health. Additionally, IoT-enabled systems provide real-time information on athletes' body conditions, assisting coaches in designing tailored training programs to enhance performance and prevent injuries. This comprehensive monitoring not only improves athletes' performance but also safeguards their well-being by detecting any adverse health issues promptly.
What are the Challenges and Solutions in IoT Network Deployment?
5 answers
Challenges in IoT network deployment include data confidentiality, integrity, authentication, and the need for robust security solutions to prevent potential threats. Additionally, issues such as the lack of efficient security procedures, inaccurate device upgrades, user unawareness, and system tracking pose significant hurdles in ensuring the security and privacy of IoT devices. Moreover, the complexity of dynamic IoT environments and the inadequacy of conventional authentication and authorization methods contribute to security risks and long latency in large-scale IoT networks. Solutions involve standardized security frameworks for IoT devices, updating certified devices, and overcoming challenges related to the network layer of IoT architecture to ensure confidentiality, integrity, and authentication. Addressing these challenges and implementing robust security measures are crucial for successful IoT network deployment.
How does exercise benefit?
4 answers
Exercise provides a multitude of benefits across various aspects of health and well-being. Regular physical activity not only helps in preventing and treating diseases like cardiovascular issues, diabetes, obesity, and cancer, but also plays a crucial role in maintaining mental health, preventing depression, and boosting self-esteem. It is emphasized that exercise is essential for overall health, functional capacity, and disease prevention, with a recommended duration of at least 30 minutes per day, five days a week for most individuals. Furthermore, exercise has been shown to have positive effects on physical performance, including improvements in endurance, strength, power, balance, and cardiovascular health. Overall, the evidence underscores the significant impact of exercise in enhancing both physical and mental well-being while reducing the risk factors associated with various noncommunicable diseases.
What factors contribute to the high secure transaction rate of Alipay?
5 answers
Alipay's high secure transaction rate can be attributed to several key factors. Firstly, Alipay emphasizes convenience and security in its mobile code-scanning settlement terminal. Secondly, Alipay's sustainable performance is mediated by factors like convenience and security, ensuring customer satisfaction. Additionally, efforts to address security risks and improve security measures are crucial for Alipay's success. Moreover, Alipay's focus on micro-payments rather than macro-payments reduces direct competition with banks, enhancing security and trust within the ecosystem. Overall, Alipay's commitment to security, convenience, sustainable performance, and strategic positioning within the ecosystem contribute significantly to its high secure transaction rate.
How dose 5g and tsn integration works ?
5 answers
The integration of 5G and Time-Sensitive Networking (TSN) works by combining the strengths of both technologies to meet the stringent requirements of Industry 4.0. 5G networks provide ultra-reliable and low-latency communications, while TSN ensures deterministic end-to-end latency and reliability for real-time applications in wired networks. This integration is crucial for supporting the flexibility and determinism demanded by Industry 4.0, where new industrial services like digital twins and cooperative robots require highly reliable communication networks. To achieve effective integration, coordination of the schedulers of both networks is essential, with TSN providing information about the capabilities of the integrated network to guide scheduling decisions in 5G, ensuring the end-to-end latency requirements of TSN traffic are met.