Results 41 to 50 of about 569,602 (292)
Development of the Software Cryptographic Service Provider on the Basis of National Standards [PDF]
The article provides a brief description of the cryptography service provider software developed by the authors of this article, which is designed to create encryption keys, private and public keys of electronic digital signature, create and confirm ...
Rakhmatillo Djuraevich Aloev +1 more
doaj
Iterative Collaborative Ranking of Customers and Providers [PDF]
This paper introduces a new application: predicting the Internet provider-customer market. We cast the problem in the collaborative filtering framework, where we use current and past customer-provider relationships to compute for each Internet customer a
Katabi, Dina, Teow, Loo Nin
core
Visualizing the underlying trends of component latencies affecting service operation performance [PDF]
This paper presents a technology agnostic method for extracting the underlying distinct patterns of variations in the overall performance of a service operation for changes to different application components supporting the service operation in a ...
Black, S.E. +3 more
core +1 more source
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley +1 more source
On the Economics of Cloud Markets [PDF]
Cloud computing is a paradigm that has the potential to transform and revolutionalize the next generation IT industry by making software available to end-users as a service. A cloud, also commonly known as a cloud network, typically comprises of hardware
Hui, Pan, Pal, Ranjan
core
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
DEPAS: A Decentralized Probabilistic Algorithm for Auto-Scaling
The dynamic provisioning of virtualized resources offered by cloud computing infrastructures allows applications deployed in a cloud environment to automatically increase and decrease the amount of used resources.
Calcavecchia, Nicolo M. +4 more
core +1 more source
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
VNF Availability and SFC Sizing Model for Service Provider Networks
This paper considers service provider network design with a view of meeting application availability. Our primary goal is to design a service provider network using disparate network components and low-availability Virtual Network Functions (VNFs) while ...
Sidharth Sharma +3 more
doaj +1 more source
A Model for ITSM Software Selection using Fuzzy TOPSIS Approach [PDF]
Nowadays a growing number of implementing informationtechnology service management (ITSM) frameworks proves the trends toimprove the IT services and processes in organizations.
Saeed Rouhani +3 more
doaj +1 more source

