24,080 research outputs found

    Improving software fault injection

    Get PDF
    Tanenbaum, A.S. [Promotor

    Building a Reliable Storage Stack

    Get PDF
    Tanenbaum, A.S. [Promotor

    Communication Architectures for Parallel-Programming Systems

    Get PDF
    Bal, H.E. [Promotor]Tanenbaum, A.S. [Promotor

    A ROOT/IO Based Software Framework for CMS

    Full text link
    The implementation of persistency in the Compact Muon Solenoid (CMS) Software Framework uses the core I/O functionality of ROOT. We will discuss the current ROOT/IO implementation, its evolution from the prior Objectivity/DB implementation, and the plans and ongoing work for the conversion to "POOL", provided by the LHC Computing Grid (LCG) persistency project

    Reynolds v. Tufenkjian, 136 Nev. Adv. Op. 19 (Apr. 9, 2020)

    Full text link
    The Court considered whether a party who purchased a judgment debtor’s rights of action could motion the Court to substitute themselves in as the real party in interest and dismiss the appeal. The Court held that only “things in action” that are otherwise assignable may be subject to execution to satisfy a judgment. The Court concluded that tort claims for personal injury—including fraud/intentional misrepresentation and elder exploitation—are generally not assignable. The Court further concluded that tort claims for injury to property and contract-based claims, unless the claims are personal in nature, are generally assignable. Therefore, the Court granted the respondents’ motion in part and the appeal was dismissed in part

    PVN-LOT-128-AC-043

    Get PDF
    Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum\u27s in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book—the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols

    Standardization Strategies of the European Middleware Initiative

    Get PDF
    • 

    corecore