14,876 research outputs found

    Special Libraries, Winter 1986

    Get PDF
    Volume 77, Issue 1https://scholarworks.sjsu.edu/sla_sl_1986/1000/thumbnail.jp

    Sixth Annual Users' Conference

    Get PDF
    Conference papers and presentation outlines which address the use of the Transportable Applications Executive (TAE) and its various applications programs are compiled. Emphasis is given to the design of the user interface and image processing workstation in general. Alternate ports of TAE and TAE subsystems are also covered

    Resources and Tools:A Step-by-Step Methodological Guide for Costing HIV/AIDS Activities

    Get PDF
    Many developing countries have recognized the need for comprehensive national reforms and comprehensive prevention, treatment, and care and support initiatives to reduce future transmission of and to meet the growing demand for HIV/AIDS services. As a part of these national health reform initiatives, governments are exploring ways to allocate resources in the most efficient and effective way to mitigate the HIV/AIDS epidemic. However, many countries lack information on the level and nature of the costs of HIV/AIDS programs. This document provides an introduction to the procedure for calculating and analyzing the costs of HIV/AIDS programs and describes how to measure directly the actual costs of a program that is up and running. The step-by-step guide is intended to provide project managers in the field with a framework for how to do measure costs for a single, recent year in the life of an HIV/AIDS program. An illustrative activities list in the report annex will assist the user to develop an activities-based framework. The information gleaned from the costing framework will enable policymakers and program managers to make informed resource allocation decisions

    Comparison of the performance of 3G security algorithms in the NAS layer

    Get PDF
    Cryptographic functionality implementation approaches have evolved over time, first, for running security software on a general-purpose processor, second, employing a separate security co-processor ,and third, using built-in hardware acceleration for security that is a part of a multi-core CPU system. The aim of this study is to do performance tests in order to examine the boost provided by accelerating KASUMI cryptographic functions on a multi-core Cavium OCTEON processor over the same non-accelerating cryptographic algorithm implemented in software. Analysis of the results shows that the KASUMI SW implementation is much slower than the KASUMI HW-based implementation and this difference increases gradually as the packet size is doubled. In detailed comparisons between the encryption and decryption functions, the result indicates that at a lower data rate, neither of the KASUMI implementations shows much difference between encryption or decryption processing, regardless of the increase in the number of data packets that are being processed. When all the 16 cores of the OCTEAN processor are populated, as the number of core increases, the number of processing cycles decreases accordingly. Another observation was that when the number of cores in use exceeds 5 cores, it doesn’t make much difference to the number of decrease of processing cycles. This work illustrates the potential that up to sixteen cnMIPS cores integrated into a single-chip OCTEON processor provides for HW- and SW-based KASUMI implementations.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Preliminary Evaluation of the Risk of Accidental Spills of Hazardous Materials in Illinois Waterways

    Get PDF
    HWRIC Project 89/90-059NTIS PB91-20877

    From diversity to convergence : British computer networks and the Internet, 1970-1995

    Get PDF
    The Internet's success in the 21st century has encouraged analysts to investigate the origin of this network. Much of this literature adopts a teleological approach. Works often begin by discussing the invention of packet switching, describe the design and development of the ARPANET, and then examine how this network evolved into the Internet. Although the ARPANET was a seminal computer network, these accounts usually only briefly consider the many other diverse networks that existed. In addition, apart from momentary asides to alternative internetworking solutions, such as the Open Systems Interconnection (OSI) seven-layer reference model, this literature concentrates exclusively on the ARPANET, the Internet, and the World Wide Web. While focusing on these subjects is important and therefore justified, it can leave the reader with the impression that the world of networking started with the ARPANET and ended with the Internet. This thesis is an attempt to help correct this misconception. This thesis analyses the evolution of British computer networks and the Internet between the years 1970 and 1995. After an introduction in Chapter 1, the thesis analyses several networks. In Chapters 2 and 3, the focus is on academic networks, especially JANET and SuperJANET. Attention moves to videotex networks in Chapter 4, specifically Prestel, and in Chapter 5, the dissertation examines electronic mail networks such as Telecom Gold and Cable & Wireless Easylink. Chapter 6 considers online services, including CompuServe, American Online, and the Microsoft Network, and the thesis ends with a conclusion in Chapter 7. All of the networks discussed used protocols that were incompatible with each other which limited the utility of the networks for their users. Although it was possible that OSI or another solution could have solved this problem, the Internet's protocols achieved this objective. This thesis shows how the networks converged around TCP/IP

    IAPSA 2 small-scale system specification

    Get PDF
    The details of a hardware implementation of a representative small scale flight critical system is described using Advanced Information Processing System (AIPS) building block components and simulated sensor/actuator interfaces. The system was used to study application performance and reliability issues during both normal and faulted operation

    Directory-Enabled Networking Design Reference

    Full text link

    Special Libraries, November 1953

    Get PDF
    Volume 44, Issue 9https://scholarworks.sjsu.edu/sla_sl_1953/1008/thumbnail.jp
    corecore