Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
Texto
Documentos relacionados
In this work, we presented the estimate and confidence intervals based in the asymptotic theory proposed by Nelson (1995) for the Mean Cumulative Function, using non
In the context of the present work, and based in a previous result (op. [13]), we extend for octonions the concept of a 2L-periodical function, that we will call Octonionic
the multidimensionality of zootherapy within a sustainable development agenda, since the exploration of animals for medicinal purposes should be one major subject in discussions
Pôde-se também perceber que os professores entendem como falta de autoridade vários tipos de situações: quando um ou mais alunos questionam suas atitudes e exigem uma explicação
In this paper, we propose a classification algorithm based on the technique of genetic algorithms and adapted to the context of social resilience.. Our objective function,
Operations such as decryption and encryption of client’s data are only associated to client admin, data recovery process is associated to cloud admin and
1) ASCCA is simple in nature and secure form timing attacks. Here the similar Blocks will take different timings for encryption/decryption. Because the Round-Key is different
In this study, we investigated the possible influences of two physical exercise modalities (resistance and water-based training) on cognitive function in healthy older adults