Results 41 to 50 of about 1,337,089 (289)

HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center

open access: yes, 2014
In cloud data center, shared storage with good management is a main structure used for the storage of virtual machines (VM). In this paper, we proposed Hybrid VM storage (HVSTO), a privacy preserving shared storage system designed for the virtual machine
Dong, Mianxiong   +3 more
core   +1 more source

Analysis of Wind and Solar Power Output Characteristics in the Gobi and Desert Areas Based on Multidimensional Dynamic Clustering [PDF]

open access: yesDianli jianshe
[Objective] To address the challenges of unclear wind and solar power output characterization,low accuracy of traditional clustering strategies,and poor performance in feature modeling due to the complex environment of the Sandy,Gobi,and Desert (SGD ...
YU Yang, GUO Yixuan, LÜ Tingyan, WANG Zhongjing, WANG Fang, WANG Wenguo
doaj   +1 more source

Quantification of efficiency improvements from integration of battery energy storage systems and renewable energy sources into domestic distribution networks [PDF]

open access: yes, 2019
Due to the increasing use of renewable, non-controllable energy generation systems energy storage systems (ESS) are seen as a necessary part of future power delivery systems.
Farrag, Mohamed E. A.   +2 more
core   +2 more sources

CDFS: A high-efficiency Data Access System for Storage Federations [PDF]

open access: yesEPJ Web of Conferences, 2020
High energy physics (HEP) experiments, such as LHAASO, produce a large amount of data, which is usually stored and processed on distributed sites. Nowadays, the distributed data management system faces some challenges such as global file namespace ...
Fu Shiyuan   +3 more
doaj   +1 more source

Auditing for Distributed Storage Systems [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2016
ToN 2014 Submission with Data ...
Le, Anh   +2 more
openaire   +4 more sources

Performance Optimization of Wireless Edge Storage System Based on SDN and Drone Assistance in Disaster Scenarios [PDF]

open access: yesJisuanji kexue
Traditional edge distributed storage systems often suffer from cumbersome network configuration and high operational overhead in measuring network state information.During peak demand periods for data storage and retrieval by terminal devices,network ...
SUN Shiquan, YE Miao, ZHU Cheng, WANG Yong, JIANG Qiuxiang
doaj   +1 more source

Non-homogeneous distributed storage systems [PDF]

open access: yes2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012
This paper describes a non-homogeneous distributed storage systems (DSS), where there is one super node which has a larger storage size and higher reliability and availability than the other storage nodes. We propose three distributed storage schemes based on (k+2; k) maximum distance separable (MDS) codes and non-MDS codes to show the efficiency of ...
Van, Vo Tam, Yuen, Chau, Li, Jing
openaire   +2 more sources

Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions

open access: yesFEBS Letters, EarlyView.
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva   +10 more
wiley   +1 more source

Optimised access to user analysis data using the gLite DPM [PDF]

open access: yes, 2009
The ScotGrid distributed Tier-2 now provides more that 4MSI2K and 500TB for LHC computing, which is spread across three sites at Durham, Edinburgh and Glasgow. Tier-2 sites have a dual role to play in the computing models of the LHC VOs.
Cowan, Greig   +4 more
core   +3 more sources

Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme

open access: yesIEEE Access, 2019
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy