?
Анализ производительности протокола CMIS на примере его реализации в Alfresco и IBM FileNet
Программная инженерия. 2012. № 7. С. 42-47.
Пелепелин И. Е., Ерофеев Е. В.
This article discusses comparative testing performance results of basic operations on documents in a Repository (IBM FileNet, Alfresco) for CMIS realization in comparison with Native API one. Some test results produce a great performance reduction in the case of CMIS using. The practical approaches of bounds definition in use of CMIS are determined.
Пелепелин И. Е., Feklistov V. V., Karandin S. et al., Программная инженерия 2013 № 1 С. 2-8
Integration issues of two software products Metasonic Suite and Alfresco are regarded at the example of subject-oriented approach in service registry development and attendant business-process. ...
Added: March 1, 2013
Golov N., Ronnback L., Business Informatics 2015 No. 3
This paper describes an approach for fast ad-hoc analysis of Big Data inside a relational data model. The approach strives to achieve maximal utilization of highly normalized temporary tables through the merge join algorithm. It is designed for the Anchor modeling technique, which requires a very high level of table normalization. Anchor modeling is a ...
Added: August 17, 2015
Ю.Л. Леохин, Кузьминков В. В., Качество. Инновации. Образование 2015 Т. 127 № 12 С. 68-78
Test results for the Floodlight, RYU and POX Openflow-controllers implemented on different server platforms are presented in the article. There were three server platforms on which the OpenFlow-controllers' performance was evaluated. ...
Added: February 26, 2016
Ivanova E., Vishnekov A., Качество. Инновации. Образование 2013 № 4 С. 63-68
The article discusses criteria for comparison of different computing systems. Analyzes the disadvantages of a computer systems evaluation by a single criterion (performance). There is suggested a method of the computer systems comparative evaluation according to the criteria set by the user. The article consists an example of using the method. ...
Added: May 23, 2013
Skripkin K., Тесленко М. А., Фундаментальные исследования 2016 № 8-2 С. 404-408
This article is dedicated to the influence of information technologies on the productivity of labor in the framework of the industrial enterprise. The paper deals with theoretical approaches about explanation of the observed negative correlation between productivity and the cost of information technology, for example: productivity paradox, the theory of general purpose technology, the theory ...
Added: August 28, 2017
NY : IEEE Computer Society, 2018
WF-IoT 2018, the 4th IEEE World Forum on Internet of Things, is the premier IEEE Forum for the Internet of Things. It is where conference attendees, from around the globe - including research institutes, academia, industry and the public sector -- share their knowledge, expertise and experiences about IoT technologies, applications, economic impacts, and social ...
Added: February 14, 2018
Silakov D., Системный администратор 2018 № 6 С. 24-28
CentOS 7 was released in 2014, but many system administrators still use the old CentOS 6.x. The more so since updates for CentOS 6 are going to be released till the year 2020. There are a lot of reasons to use the old version, but one of the major ones is significants of functional changes ...
Added: October 19, 2018
Wien : DAAAM International Vienna, 2017
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the ...
Added: February 1, 2018
Хивинцев М. А., Akopov A. S., Бизнес-информатика 2013 № 3(25) С. 35-41
In the article is presented a novel approach to the solution of multi-objective optimizing problems of large-scale dimension systems realized, in particular, in the simulation systems of the class AnyLogic through distributed calculations. A new concept of creation of the distributed evolutionary network is suggested, based on splitting of space of required variables into clusters ...
Added: October 3, 2013
Vikentyeva O., Deryabin A. I., Shestakova L. V., International Journal "Information Theories and Applications" 2015 Т. 22 № 2 С. 169-182
In this paper we continue the investigation related to the develpoment of tools for the design and implementation of computer business games, aimed at creating a certain level of competence in the process of realization of the scenarios defined by models of applied domain. ...
Added: July 15, 2015
Baranov P., Системы высокой доступности 2014 № 4 С. 94-98
During creation of a centralized identity management IT-service the IT-project's management division faces necessity of making a number of decisions that influence the project as a whole and could be crucial for its overall success. These decisions include: automation processes' selection (creation, modification, removal of user identities, user rights' reconciliation), managed IT-systems' user rights role ...
Added: February 11, 2015
Fuad Aleskerov, Demin S., Shvydun S., SN Computer Science 2020 Vol. 1 No. 2 Article 68
The paper examines the choice problem when the total number of observations and criteria is too large. There are many different procedures, which are used for decision-making process under multiple criteria; however, most of them cannot be applied to large datasets due to their computational complexity while others provide sufficient accuracy. To solve the problem, ...
Added: February 20, 2020
Aier S., Gordijn J., Proper H. . et al., IEEE Computer Society, 2020
The 22nd IEEE International Conference on Business Informatics (IEEE CBI 2020) was held June 22–24, 2020. This time, the conference was hosted by the University of Antwerp, Belgium but due to the COVID-19 pandemic, the conference was organized online. While this is not the preferred format of an academic conference, it provided the opportunity to ...
Added: July 13, 2020
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Lychkina N. N., Глазков Д. Н., Хоружевская А. П., Логистика и управление цепями поставок 2014 Т. 05 № 64 С. 57-63
В статье демонстрируется применение метода имитационного моделирования в среде AnyLogic в целях оптимизации логистической сети промышленной компании, работающей на рынке промышленных газов. В модели детализированы основные процессы, связанные с транпортировкой продукта, обслуживанием заявок клиентов и распределением продукта потребителям. Были учтены факторы, носящие стохастический характер, такие как неритмичность производства, погодные условия, влияющие на уровень спроса, количество ...
Added: November 30, 2014
Akopov A. S., Beklaryan L. A., Saghatelyan A. K., Environmental Modelling and Software 2019 Vol. 116 P. 7-25
Urban greenery such as trees can effectively reduce air pollution in a natural and eco-friendly way. However, how to spatially locate and arrange greenery in an optimal way remains as a challenging task. We developed an agent-based model of air pollution dynamics to support the optimal allocation and configuration of tree clusters in a city. The Pareto ...
Added: February 24, 2019
Silakov D., Системный администратор 2018 № 10 С. 34-39
С ростом популярности контейнеризации приложений растет спрос на приложения, способные управлять большим количеством контейнеров. На слуху прежде всего Kubernetes и Docker Swarm. Однако у них есть и другие достойные открытые конкуренты. В этой статье мы рассмотрим Mesos, развиваемый фондом Apache ...
Added: February 20, 2019
Samodurov V., Kornilov V., Isaev E., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 176-186
The main threats to the reliability and information security data centers are designated and systematized. In first there are the technical threat of failure of the life support systems of various DC: server nodes, power system, air-conditioning, fire-fighting, provider's lines, cable systems, etc. In second there are external threats: in particular, the threat of DDoS-attacks ...
Added: February 19, 2015
Silakov D., Системный администратор 2017 № 6-7 С. 19-23
Many third party applications installed in a Linux system only requires a minimal base components from the target distribution and it is logical to put them intsome isolated environment which will guarantee additional stability and safety - for example, in case when application libraris overrided the system ones.
Container (more particular - isolation techniques that are ...
Added: August 24, 2017
L. : IEEE, 2016
IntelliSys 2016 conference will focus on areas of intelligent systems and artificial intelligence and how it applies to the real world. It is an opportunity for researchers in this field to meet and discuss solutions, scientific results, and methods in solving important problems in this field. Conference Topics include, but are not limited to: Artificial ...
Added: February 25, 2017
Serova E., Guryeva I., Khvatova T., International Journal of Technology and Human Interaction 2018
In such a socially significant sphere as healthcare industry, innovation activity has become vital especially in such areas as automation of physician working place, creation of unified electronic medical record, distribution of intelligent decision support systems for medical solutions, application and wide dissemination of new medical technologies, telemedicine development. The intersection of medicine and ICT ...
Added: March 15, 2018
Yasnitsky L., Пермь : Пермский государственный национальный исследовательский университет. – Электронные данные. , 2020
The collection contains materials from the international conference "Intelligent systems in science and technology" and the Sixth all-Russian scientific and practical conference "Artificial intelligence in solving urgent social and economic problems of the XXI century", which was held on October 12-18, 2020 in Perm as part of the Perm natural science forum "Mathematics and global ...
Added: December 4, 2020
Красноярск : ИВМ СО РАН, 2013
Труды Пятой Международной конференции «Системный анализ и информационные технологии» САИТ-2013 (19–25 сентября 2013 г., г.Красноярск, Россия): ...
Added: November 18, 2013