Results 31 to 40 of about 3,640,448 (271)
On the stability of two-chunk file-sharing systems [PDF]
We consider five different peer-to-peer file sharing systems with two chunks, with the aim of finding chunk selection algorithms that have provably stable performance with any input rate and assuming non-altruistic peers who leave the system immediately ...
B. Fan +21 more
core +3 more sources
Design and Implementation of a Distributed Versioning File System for Cloud Rendering
Rendering is widely used for visual effects in animations, video games, and movies. As the computational load in rendering workloads fluctuates greatly over time, it is attractive to use cloud infrastructures for cost-effective rendering.
Kyungwoon Cho, Hyokyung Bahn
doaj +1 more source
Blockchain-Based Decentralized Architecture for Software Version Control
Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. Following the success of bitcoin,
Muhammad Hammad +8 more
doaj +1 more source
The communication processor of TUMULT-64 [PDF]
Tumult (Twente University MULTi-processor system) is a modular extendible multi-processor system designed and implemented at the Twente University of Technology in co-operation with Oce Nederland B.V. and the Dr.
Jansen, Pierre G., Smit, Gerard J.M.
core +3 more sources
Intelligent System for Data Tracking in Image Editing Company
The success of data transaction in a company largely depends on the intelligence system used in its database and application system. The complex and heterogeneous data in the log file make it more difficult for users to manage data effectively. Therefore,
Kimlong Ngin +4 more
doaj +1 more source
The Dwarf Spheroidal Companions to M31: WFPC2 Observations of Andromeda I [PDF]
Images have been obtained with the Hubble Space Telescope WFPC2 camera of Andromeda I, a dwarf spheroidal (dSph) galaxy that lies in the outer halo of M31.
Armandroff, T. E. +3 more
core +3 more sources
Objectives: The study's objective was to contrast the two distinct rotary file techniques used to shape mandibular first molars. Materials and Methods: The investigation involved twenty recently removed mandibular molars.
Bollineni Swetha +6 more
doaj +1 more source
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando +4 more
core +1 more source
Background: Postendodontic pain is a common concern following root canal treatment. The rotary file system used during the procedure significantly influences this pain.
Sambarta Das +5 more
doaj +1 more source
Steganography in Audio Using Wavelet and DES
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive.
Baghdad Science Journal
doaj +1 more source

