Showing 1 - 19 results of 19 for search '"tenancy"', query time: 0.05s Refine Results
  1. 1

    Research on dynamic migration of critical virtual machines for multi-tenancy by Shuo ZHAO, Xin-sheng JI, Guo-zhen CHENG, Yu-xing MAO

    Published 2017-08-01
    “…A dynamic migration method of critical virtual machines for multi-tenancy was proposed.Firstly,the tenants can set ratio of critical virtual machines according to tenant's security requirements,then the dynamic migration frequency of virtual machines were maximized by the coexistence time constraints between virtual machines,finally the migration cost was minimized as an object function for the virtual machines migrated to further reduce the migration cost.Simulation experiments demonstrate that the proposed approach can reduce the impact on the performance of network services and the cost of virtual machines migration,and is more suitable for large-scale network scenarios under the premise of effective defense side-channel attacks.…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Agricultural law / by Rodgers, C. P. (Christopher P.)

    Published 2016
    Table of Contents: “…Agricultural land tenure and protective legislation -- Land use and the law of the common agricultural policy -- Farm business tenancies -- Termination of farm business tenancies -- Agricultural holdings -- Agricultural holdings : the tenancy agreement -- Agricultural holdings : security of tenure -- Statutory succession to gricultural holdings -- Agricultural holdings : compensation on termination of tenancy -- Market gardens, smallholdings and allotments -- Farm cottages -- Planning law and development control -- Agriculture, nature conservation and land use -- Pollution control and land use -- Land use and the common agricultural policy.…”
    View in OPAC
    Book
  7. 7

    Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications by Milos Simic, Jovana Dedeic, Milan Stojkov, Ivan Prokic

    Published 2025-01-01
    “…In modern architecture, multi-tenancy is the design mode of operation used to reduce the resource costs of system implementation. …”
    Get full text
    Article
  8. 8

    Research and design of multi-tenant scheme for Kubernetes container cloud platform by Danchi HUANG, Zhenwei HE, Liyun YAN, Yuanzhi LIN, Xinzhang YANG

    Published 2020-09-01
    “…In the container cloud platform,tenants share the underlying computing,storage,network and other resources,and there are problems with the operation of the tenant container and data security.Based on the analysis of Kubernetes scheme based on access control and resource isolation,a multi-tenant cloud platform was proposed,which covers multi-tenancy management model,multi-tenant access control,computing resources isolated and network resources,etc.The proposed model can be practically improving resource isolation capability based on containers of Kubernetes cloud platform,effectively reduce the data security hidden danger.…”
    Get full text
    Article
  9. 9

    2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Florida Landlord-Tenant Law [State] by Leo C. Polopolus, Michael T. Olexa, Fritz Roka, Carol Fountain

    Published 2003-07-01
    “… The Florida Landlord-Tenant Law defines terms for termination of tenancy by either party. This is EDIS document FE400, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
    Get full text
    Article
  10. 10

    2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Florida Landlord-Tenant Law [State] by Leo C. Polopolus, Michael T. Olexa, Fritz Roka, Carol Fountain

    Published 2003-07-01
    “… The Florida Landlord-Tenant Law defines terms for termination of tenancy by either party. This is EDIS document FE400, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
    Get full text
    Article
  11. 11

    Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO

    Published 2016-08-01
    “…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
    Get full text
    Article
  12. 12

    In-band network telemetry system based on high-performance packet processing architecture VPP by Tian PAN, Xingchen LIN, Jiao ZHANG, Tao HUANG, Yunjie LIU

    Published 2021-03-01
    “…An in-band network telemetry-based system was built based on VPP, a high-performance virtual network forwarding architecture/device, via reorganizing the data plane pipeline processing modules.Moreover, a network-wide telemetry mechanism was further developed via embedding source routing into the probe packet header for specifying the route of probe packets.Finally, a virtual network topology was built with performance evaluation conducted.The evaluation shows that the telemetry system can monitor the network in a high precision of every 0.13 ms, detecting link congestion in real time with minor performance overhead.Given virtual network devices have been widely deployed in data centers, the proposed scheme is expected to improve the reliability of multi-tenancy and network function virtualization in data centers via high-precision, network-wide virtual link telemetry coverage.…”
    Get full text
    Article
  13. 13

    Research on SaaS Support Architecture and Key Technologies by Xiaodong Zhang, Lanshun Nie, Fanchao Meng

    Published 2013-12-01
    “…There are some problems about SaaS supported by the popular PaaS and IaaS: customizing SaaS is commonly not done deeply without semantic association; sources are wasted when SaaS applications are scaled by VM and whole application unit; SaaS applications developed by the 3rd party software vendors are not enough supported in multi-tenancy. So BIRISF was presented. Management was improved finely in way of managing SaaS components. …”
    Get full text
    Article
  14. 14

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. …”
    Get full text
    Article
  15. 15

    A Religious Response to Environmental Flippancies in Akan Communities in Ghana by Emmanuel Twumasi-Ankrah, Yaw Adu-Gyamfi

    Published 2024-12-01
    “…This paper argues that the ecological narrative in Akan communities has changed chiefly because of social conflicts, engineered by factors such as the basic needs of humans, politicization, desacralization, materialism, economics, “development,” culture, chieftaincy, international relations, tenancy, religion, civil action and many more. However, Akan religious people to whom this paper has pointed fingers as part of the problem, have what it takes to contribute to salvaging the environmental crisis in Ghana. …”
    Get full text
    Article
  16. 16

    Study of a System Dynamics Model of Wuhan Commodity Housing Price by Jingyi Guo, Junwu Wang, Denghui Liu, Shi Qiao, Han Wu

    Published 2021-01-01
    “…Eight subsystems, namely, housing demand, housing supply, housing price, urban population, urban economy, housing land, housing tenancy, and macro-control, are studied. Taking the relevant data of Wuhan as an example, the Vensim DSS is used for simulations. …”
    Get full text
    Article
  17. 17

    Does climate-smart agriculture technology improve farmers' subjective well-being? Micro-level evidence from Odisha, India by Dukhabandhu Sahoo, Pritisudha Mohanty, Surbhi Mishra, Manash Kumar Behera, Souryabrata Mohapatra

    Published 2025-01-01
    “…Therefore, it is necessary to evaluate government regulations regarding land and tenancy as well as develop measures for farmers to adapt to new technologies.…”
    Get full text
    Article
  18. 18

    Gender Analysis, Milk Value Chain, Kabale Uganda. Kabale: Kabale University. by Tugume, Samuel

    Published 2024
    “…There is a need to Advocate for legal reforms or programs that guarantee women's rights to own land or have secure tenancy agreements. Efforts should be made to facilitate access to credit or microloans specifically for women to purchase dairy cows. …”
    Get full text
    Thesis
  19. 19

    A nexus between regional welfare and sustainable development: A conceptual model by Mariya V. Shlyapina, Elena A. Tretyakova

    Published 2025-01-01
    “…The proposed conceptual model advances scientific ideas about the main tenance of sustainable regional development, contributes to the theory of welfare, and creates a basis for devising a method to measure regional welfare.…”
    Get full text
    Article