Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Alireza Chamkoori"'
Autor:
Alireza Chamkoori, Serajdean Katebi
Publikováno v:
مهندسی مخابرات جنوب, Vol 12, Iss 47, Pp 71-83 (2024)
Data security and privacy in data centers is an important issue. The major anxiety in security and privacy is the result of the fact that the topography of important operas can be available to sensitive information. To improve storage in distributed
Externí odkaz:
https://doaj.org/article/d0b44b0b8416414892f0d6064bb35ca0
Autor:
Alireza Chamkoori, Serajdean Katebi
Publikováno v:
Concurrency and Computation: Practice and Experience. 35:1-1
Autor:
Alireza Chamkoori, Serajdean Katebi
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Storing extensive data in cloud environments affects service quality, transmission speed, and access to information in systems, which is becoming a growing challenge. In storage improvement, reducing various costs and reducing the shortest path in th
Publikováno v:
International Journal of Advanced Computer Science and Applications. 8
Data Grid provides resources for data-intensive scientific applications that need to access a huge amount of data around the world. Since data grid is built on a wide-area network, its latency prohibits efficient access to data. This latency can be d
Autor:
Alireza Chamkoori, Saeed Talatian Azad
Coordination is a main issue in software agent systems in particular, and in distributed artificial intelligence (DAI) in general. There are several reasons why multi agents need to be coordinate: Preventing anarchy or chaos, Meeting global constrain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::def83dab9b1eae3d3a5a3c6370d791cd
https://doi.org/10.1115/1.859919.paper349
https://doi.org/10.1115/1.859919.paper349
Publikováno v:
2009 Second International Conference on Computer and Electrical Engineering.
Access control is a part of software systems which hasn’t presented as an independent part of software development process. It is often used after Software development and applies access policies. In this paper we present an approach to implement R