Showing 41 - 60 results of 90 for search 'hosted service provider', query time: 0.07s Refine Results
  1. 41
  2. 42

    Social-aware caching and forwarding for video streaming in information-centric 5G VANET by Tengfei CAO, Cuili JIANG, Zhiqiang LIU, Xiaoying WANG

    Published 2019-12-01
    “…The arrival of 5G-enabled communication technology has laid the foundation for providing high-quality video stream services in vehicular Ad Hoc network (VANET).However,current VANET still distribute video content over IP networks which design for host communication instead of content distribution.The mismatch between network function and design goals brings huge challenges for providing high quality video service.Based on the above questions,a social-aware caching and forwarding was proposed to support efficient video streaming services and the time complexity of the algorithm was O(m<sup>2</sup>).Firstly,a virtual community was constructed by analyzing the user's behaviors.Then,a fast forwarding scheme was introduced to ensure that users could discover the requested videos nearby.Finally,a community-based caching policy was proposed to optimize the in-community caching distributions.Simulation results show how the proposed strategy achieves better performance than other state-of-art solutions in terms of caching hit ratio,searching delay and control overhead.…”
    Get full text
    Article
  3. 43

    Distrust Spillover in Sharing Accommodation: Evidence From Airbnb in Beijing by Xin Jin, Bo Wang, Ning Ma

    Published 2025-01-01
    “…It also provided strategic support for the development of sharing accommodations and contributed to optimizing service.…”
    Get full text
    Article
  4. 44

    An Architecture-Based Adaptation Framework for Soft Real-Time Applications by Xiaoan Bao, Na Zhang, Ning Gui, Jinyu Song

    Published 2012-09-01
    “…This framework is designed to be easily extended with other constraint resolving policies as well as dependence descriptions languages and can be used to provide real-time computing services for cloud computing. …”
    Get full text
    Article
  5. 45

    Automated Windows domain penetration method based on reinforcement learning by Lige ZHAN, Letian SHA, Fu XIAO, Jiankuo DONG, Pinchang ZHANG

    Published 2023-08-01
    “…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
    Get full text
    Article
  6. 46

    Foreign direct investment and the structural transition of energy consumption: impact and mechanisms by Xia Fang, Zhenyu Yang, Yun Zhang, Xiao Miao

    Published 2024-12-01
    “…Heterogeneity analysis revealed that FDI has a greater negative impact on the renewable energy consumption structure in low-income countries and non-OECD countries, as well as in countries with high levels of agricultural and manufacturing development and low levels of service sector development. Moreover, the Kyoto Protocol is not conducive to the increase in the proportion of renewable energy consumption in host countries. …”
    Get full text
    Article
  7. 47

    Mechanisms of inequalities in health and safety : conceptual model and research agenda by Stephanie Premji

    Published 2014-03-01
    “…We describe how language barriers, cultural differences, vulnerable legal status, precarious economic status, newness in the host country and job, lower education and skill levels, and discrimination all generate vulnerabilities that are embodied as poor working conditions, limited knowledge of health and safety, impeded communication with employers and service providers, detrimental behaviours towards risks or health, and constrained agency. …”
    Get full text
    Article
  8. 48

    Mécanismes d’inégalités en santé et sécurité : modèle conceptuel et agenda de recherche by Stephanie Premji

    Published 2014-04-01
    “…We describe how language barriers, cultural differences, vulnerable legal status, precarious economic status, newness in the host country and job, lower education and skill levels, and discrimination all generate vulnerabilities that are embodied as poor working conditions, limited knowledge of health and safety, impeded communication with employers and service providers, detrimental behaviours towards risks or health, and constrained agency. …”
    Get full text
    Article
  9. 49

    A Rough Penalty Genetic Algorithm for Multicast Routing in Mobile Ad Hoc Networks by Chih-Hao Lin, Chia-Chun Chuang

    Published 2013-01-01
    “…Multicast routing is an effective way to transmit messages to multiple hosts in a network. However, it is vulnerable to intermittent connectivity property in mobile ad hoc network (MANET) especially for multimedia applications, which have some quality of service (QoS) requirements. …”
    Get full text
    Article
  10. 50
  11. 51
  12. 52

    Transitioning health workers from PEPFAR contracts to the Uganda government payroll by Everd, Bikaitwoha Maniple

    Published 2021
    “…At the sub-national level, facilitators of transition in ‘high absorber’ districts were identified as the presence of transition ‘champions’, prioritizing HWs in district wage bill commitments, host facilities providing ‘bridge financing’ to transition workforce during salary delays and receiving donor technical support in district wage bill analysis—attributes that were absent in ‘low absorber’ districts. …”
    Get full text
    Article
  13. 53

    The effect of labour migration and structural changes on economic development by O. Nosova

    Published 2024-06-01
    “…It has been mistaken to believe that migrants will serve as a safety valve for developed economies, by providing labour in times of expansion and going away in the recession (Castles & Vezzoli, 2009). …”
    Get full text
    Article
  14. 54

    Molecular prevalence and associated risk factors of Entamoeba spp. in donkeys in Shanxi Province, North China by Ze-Dong Zhang, Han-Dan Xiao, Dong-Yang Wang, Nan Su, Xun-Zhi Liu, Zi-Rui Wang, Shi-Chen Xie, Xing-Quan Zhu, Shuo Zhang, Wen-Wei Gao

    Published 2025-02-01
    “…This not only expands the geographical distribution but also broadens the host range of Entamoeba spp., addressing the knowledge gap regarding the prevalence of Entamoeba spp. in donkeys, providing baseline data for carrying out prevention and control of Entamoeba spp. in donkeys in China. …”
    Get full text
    Article
  15. 55
  16. 56

    Assessment of the Impact of Community-Based Tourism on the Economic, Social, and Cultural Empowerment of Women (Case Study: Coastal Villages of Bushehr Province) by Ali Shamsoddini, Fatemeh Dehghani

    Published 2024-06-01
    “…Ethical Considerations:All study participants provided informed consent and the researchers assured them of complete confidentiality and anonymity in relation to the study results. …”
    Get full text
    Article
  17. 57

    Training Psychological Skills: Efficacy and Assessment of a Nonclinical Psychological Sports Coaching E-Intervention for Young Elite Athletes by Raphaël Bonetti, Fabienne Crettaz von Rotten, Denis Hauw

    Published 2025-01-01
    “…Crafted to be accessible through a tap on a mobile screen or a click on a website, these applications host an array of features, including practical exercises, comprehensive explanations, AI chatbots, and engaging videos. …”
    Get full text
    Article
  18. 58

    Women and Kula by Susanne Kuehling

    Published 2025-01-01
    “… This article argues that the hosting of kula partners is an important part of the exchange system that requires more attention. …”
    Get full text
    Article
  19. 59

    Energy Conservation Using Dynamic Voltage Frequency Scaling for Computational Cloud by A. Paulin Florence, V. Shanthi, C. B. Sunil Simon

    Published 2016-01-01
    “…Cloud computing is a new technology which supports resource sharing on a “Pay as you go” basis around the world. It provides various services such as SaaS, IaaS, and PaaS. …”
    Get full text
    Article
  20. 60

    Hindguts of Kyphosus sydneyanus harbor phylogenetically and genomically distinct Alistipes capable of degrading algal polysaccharides and diazotrophy by Cesar T. Facimoto, Kendall D. Clements, W. Lindsey White, Kim M. Handley

    Published 2025-01-01
    “…Given the symbiotic role of gut communities in the Kyphosus sydneyanus hindgut, where Alistipes are prevalent, and the diversity of carbohydrate-active enzymes (CAZymes) encoded that likely contribute to the breakdown of important substrates in the host diet, it is likely that this genus provides essential services to the fish host. …”
    Get full text
    Article