Academic literature on the topic 'Isolation guarantee'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Isolation guarantee.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Isolation guarantee"

1

Huang, Jie, and Z. F. Yu. "Design and validation of micro-vibration isolator for reaction wheels in consideration of launch environment of satellite." Noise Control Engineering Journal 71, no. 1 (January 1, 2023): 42–56. http://dx.doi.org/10.3397/1/37715.

Full text
Abstract:
Micro-vibration is an important factor that influences the imager orientation accu- racy and even deteriorates the quality of image of high-resolution satellite. To eliminate the influences of micro-vibration, a passive micro-vibration isolation method is proposed for reaction wheels (RWs) of satellite. At the same time, the launch environment is fully considered in the design of isolation system to guarantee the safety of both RWs. The isolation efficiency and orientation stability experiment results show that, without isolators, the peak value of the torque output reaches more than 10 Nm that is sharply depressed with isolation system operating mode. Without isolators, four clear peak values located at 10 Hz, 41 Hz, 47 Hz, 83 Hz are found in the orientation oscillation of RW. The random vibration experiments show that the maximal acceleration output 34.61 g is much lower than the RW design value 49 g which guarantees the safety of RW under harsh launch environment. The isolating efficiency is higher than 75% which is suitable for the requirement of the imager on-board the SDLT-1 satellite.
APA, Harvard, Vancouver, ISO, and other styles
2

Beentjes, Wilhelmus. "A special procedure to guarantee sound isolation in dwellings." Journal of the Acoustical Society of America 123, no. 5 (May 2008): 3191. http://dx.doi.org/10.1121/1.2933317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kazemi, Milad, Mateo Perez, Fabio Somenzi, Sadegh Soudjani, Ashutosh Trivedi, and Alvaro Velasquez. "Assume-Guarantee Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (March 24, 2024): 21223–31. http://dx.doi.org/10.1609/aaai.v38i19.30116.

Full text
Abstract:
We present a modular approach to reinforcement learning (RL) in environments consisting of simpler components evolving in parallel. A monolithic view of such modular environments may be prohibitively large to learn, or may require unrealizable communication between the components in the form of a centralized controller. Our proposed approach is based on the assume-guarantee paradigm where the optimal control for the individual components is synthesized in isolation by making assumptions about the behaviors of neighboring components, and providing guarantees about their own behavior. We express these assume-guarantee contracts as regular languages and provide automatic translations to scalar rewards to be used in RL. By combining local probabilities of satisfaction for each component, we provide a lower bound on the probability of satisfaction of the complete system. By solving a Markov game for each component, RL can produce a controller for each component that maximizes this lower bound. The controller utilizes the information it receives through communication, observations, and any knowledge of a coarse model of other agents. We experimentally demonstrate the efficiency of the proposed approach on a variety of case studies.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Jian Liang, Xiao Xi Liu, Shu Qing Li, Zhi Fei Tao, and Lei Ma. "Research on Vibration Isolation System Based on Disturbance Observer PID Control Algorithm." Applied Mechanics and Materials 865 (June 2017): 480–85. http://dx.doi.org/10.4028/www.scientific.net/amm.865.480.

Full text
Abstract:
The research mainly focuses on the performance of the controllable hypocenter in the low frequency band. The hybrid vibration isolation method based on the disturbance observer PID control algorithm is used to improve the excitation signal quality. Based on the analysis of the structure and working principle of vibration isolator, the physical model and mathematical model are established, and the simulation test of ZK-5VIC virtual test vibration and control system is carried out. The experimental platform of hybrid vibration isolation system with low frequency interference is set up. The experiment of excitation and acquisition of low frequency signal is carried out, which provides the theoretical basis and guarantee for the vibration isolation technology in the low frequency range below 3Hz.
APA, Harvard, Vancouver, ISO, and other styles
5

Yum, Dayun, and Dongcheon Shin. "A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization." Jouranl of Information and Security 23, no. 4 (October 31, 2023): 23–32. http://dx.doi.org/10.33778/kcsa.2023.23.4.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nasare, Ruchita, Sakshi Garad, Sakshi Patil, and Nikita Besekar. "Fault Detection and Isolation ofDCMicro-Grid." April-May 2023, no. 33 (May 25, 2023): 31–39. http://dx.doi.org/10.55529/jeet.33.31.39.

Full text
Abstract:
In a microgrid, faults can lead to voltage instability, which can produce voltage sags, swells, or even a full collapse of the voltage. This may result in electrical equipment damage and interfere with the microgrid's operation. Faults can also produce safety risks including fire, explosion, or electrocution, which can endanger employees and harm equipment. By isolating or shutting down the system when a malfunction is found, the danger of harm or injury is reduced. The purpose of fault isolation and detection in a DC microgrid is to guarantee the microgrid's dependability and safety. The microgrid's flaws are found using fault detection and isolation (FDI) techniques, which are then used to isolate them so they won't influence other system components. Themicrogrid's downtime can be reduced by immediately identifying and isolating issues, ensuring a steady supply of electricity to the associated loads. Additionally, fault isolation and detection can stop problems from spreading to other system components, which can reduce the severity of the fault's harm.The purpose of this research is to identify and isolate faults that occur in DC microgrids, as well as to minimise their impact. In this project fault detection and isolation is properly done, for detecting a fault microprocessor is used which continuously monitor the values of current and voltage and for isolation of microgrid relay is used. We are successfully providing the circuit which detects the fault and isolate within the time which reduces the severity of fault and protect the healthy
APA, Harvard, Vancouver, ISO, and other styles
7

Kingsbury, Kyle, and Peter Alvaro. "Elle." Proceedings of the VLDB Endowment 14, no. 3 (November 2020): 268–80. http://dx.doi.org/10.14778/3430915.3430918.

Full text
Abstract:
Users who care about their data store it in databases, which (at least in principle) guarantee some form of transactional isolation. However, experience shows that many databases do not provide the isolation guarantees they claim. With the recent proliferation of new distributed databases, demand has grown for checkers that can, by generating client workloads and injecting faults, produce anomalies that witness a violation of a stated guarantee. An ideal checker would be sound (no false positives), efficient (polynomial in history length and concurrency), effective (finding violations in real databases), general (analyzing many patterns of transactions), and informative (justifying the presence of an anomaly with understandable counterexamples). Sadly, we are aware of no checkers that satisfy these goals. We present Elle: a novel checker which infers an Adya-style dependency graph between client-observed transactions. It does so by carefully selecting database objects and operations when generating histories, so as to ensure that the results of database reads reveal information about their version history. Elle can detect every anomaly in Adya et al's formalism (except for predicates), discriminate between them, and provide concise explanations of each. This paper makes the following contributions: we present Elle, demonstrate its soundness over specific datatypes, measure its efficiency against the current state of the art, and give evidence of its effectiveness via a case study of four real databases.
APA, Harvard, Vancouver, ISO, and other styles
8

Cho, Chang Beck, Young Jin Kim, Won Jong Chin, and Jin-Young Lee. "Comparing Rubber Bearings and Eradi-Quake System for Seismic Isolation of Bridges." Materials 13, no. 22 (November 20, 2020): 5247. http://dx.doi.org/10.3390/ma13225247.

Full text
Abstract:
Seismic isolation systems have been used worldwide in bridge structures to reduce vibration and avoid collapse. The seismic isolator, damper, and Shock Transmission Unit (SUT) are generally adopted in the seismic design of bridges to improve their seismic safety with economic efficiency. There are several seismic isolation systems, such as Natural Rubber Bearing (NRB), Lead Rubber Bearing (LRB), and the Eradi-Quake System (EQS). EQS as a new technology is expected to effectively reduce both seismic force and displacement, but there is still some need to verify whether it might provide an economical and practical strategy for a bridge isolation system. Moreover, it is important to guarantee consistent performance of the isolators by quality control. A comparative evaluation of the basic properties of the available seismic isolators is thus necessary to achieve a balance between cost-effectiveness and the desired performance of the bridge subjected to extreme loading. Accordingly, in this study, the seismic response characteristics of the seismic isolation systems for bridges were investigated by conducting compressive test and compressive-shear test on NRB, LRB, and EQS.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Cong, Zhong Hong, and Jian-Min Jiang. "Scheduling in Real-Time Mobile Systems." ACM Transactions on Embedded Computing Systems 21, no. 3 (May 31, 2022): 1–36. http://dx.doi.org/10.1145/3517747.

Full text
Abstract:
To guarantee the safety and security of a real-time mobile system such as an intelligent transportation system, it is necessary to model and analyze its behaviors prior to actual development. In particular, the mobile objects in such systems must be isolated from each other so that they do not collide with each other. Since isolation means two or more mobile objects must not be located in the same place at the same time, a scheduling policy is required to control and coordinate the movement of such objects. However, traditional scheduling theories are based on task scheduling which is coarse-grained and cannot be directly used for fine-grained isolation controls. In this article, we first propose a fine-grained event-based formal model called a time dependency structure and use it to model and analyze real-time mobile systems. Next, an event-based schedule is defined and the composition of schedules is discussed. Then, we investigate the schedulability of isolation—that is, checking whether a given schedule ensures the isolation relationship among mobile objects or not. After that, we present an automation approach for scheduling generation to guarantee isolation controls in real-time mobile systems. Finally, case studies and simulation experiments demonstrate the usability and effectiveness of our approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Zheng, Zhi, Xiaolan Pan, and Xu Bao. "Sequential Ground Motion Effects on the Behavior of a Base-Isolated RCC Building." Mathematical Problems in Engineering 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/3579713.

Full text
Abstract:
The sequential ground motion effects on the dynamic responses of reinforced concrete containment (RCC) buildings with typical isolators are studied in this paper. Although the base isolation technique is developed to guarantee the security and integrity of RCC buildings under single earthquakes, seismic behavior of base-isolated RCC buildings under sequential ground motions is deficient. Hence, an ensemble of as-recorded sequential ground motions is employed to study the effect of including aftershocks on the seismic evaluation of base-isolated RCC buildings. The results indicate that base isolation can significantly attenuate the earthquake shaking of the RCC building under not only single earthquakes but also seismic sequences. It is also found that the adverse aftershock effect on the RCC can be reduced due to the base isolation applied to the RCC. More importantly, the study indicates that disregarding aftershocks can induce significant underestimation of the isolator displacement for base-isolated RCC buildings.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Isolation guarantee"

1

Rathore, Muhammad Siraj. "Performance, Isolation and Service Guarantees in Virtualized Network Functions." Doctoral thesis, KTH, Network Systems Laboratory (NS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-206830.

Full text
Abstract:
A network is generally a collection of different hardware-based network devices carrying out various network functions, (NF). These NF implementations are special purpose and expensive. Network function virtualization (NFV) is an alternative which uses software-based implementation of NFs in inexpensive commodity servers. However, it is challenging to achieve high networking performance due to bottlenecks in software, particularly in a virtualized environment where NFs are implemented inside the virtual machines (VM). The performance isolation is yet another challenge, which means that the load on one VM should not affect the performance of other VMs. However, it is difficult to provide performance isolation due to resource contention in a commodity server. Furthermore, different NFs may require different service guarantees which are difficult to ensure due to the non-deterministic performance behavior of a commodity server. In this thesis we investigate how the challenges of performance, isolation and service guarantees can be addressed for virtual routers (VR), as an example of a virtualized NF. It is argued that the forwarding path of a VR can be modified in an efficient manner in order to improve the forwarding performance. When it comes to performance isolation, poor isolation is observed due to shared network queues and CPU sharing among VRs. We propose a design with SR-IOV, which allows reserving a network queue and CPU core for each VR. As a result, the resource contention is reduced and strong performance isolation is achieved. Finally, it is investigated how average throughput and bounded packet delay can be guaranteed to VRs. We argue that a classic rate-controlled service discipline can be adapted in a virtual environment to achieve service guarantees. We demonstrate that firm service guarantees can be achieved with little overhead of adding token bucket regulator in the forwarding path of a VR.

QC 20170511

APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Ye. "Isolation Mechanisms within the vSwitch of Cloud Computing Platform." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS191.

Full text
Abstract:
En tant que composant important de la plate-forme cloud, le commutateur virtuel (vSwitch) est responsable de la réalisation de la connectivité réseau entre les machines virtuelles (VM) et les périphériques externes. La plupart des vSwitches existants adoptent le principe de conception partagée, qui détruit l'isolation entre les VMs. Dans vSwitch, différentes VMs se disputent les ressources partagées et accèdent à la mémoire sans restriction, cela les rend incapables de garantir une qualité de service (QoS) réseau stable, tout en faisant face au risque d'attaques de plans de données et d'accès illégaux à la mémoire. Afin de résoudre ces problèmes de performance, de défaillance et de sécurité causés par le manque d'isolement, les principaux travaux et contributions de cette thèse sont les suivants : 1) Méthode QoS réseau basée sur l'isolation du cycle CPU (C2QoS). Cette approche garantit la bande passante du réseau VM en isolant la concurrence des ressources CPU, et en même temps réduisant de 80 % la latence supplémentaire du réseau de VM causée par la concurrence. 2) Mécanisme de défense contre les attaques du plan de données basé sur l'isolement de la table de flux (D-TSE). D-TSE utilise VM comme unité pour séparer la structure de la table de flux afin d'obtenir des performances de classification de paquets indépendantes et une isolation des pannes au prix d'une utilisation CPU supplémentaire de 5 %. 3) Mécanisme d'E/S réseau virtualisé (VNIO) basé sur l'isolation de l'accès mémoire (S2H). Basé sur un modèle de partage de mémoire sécurisé, S2H assure l'isolation et la sécurité de la mémoire des VM au prix d'une latence accrue de 2 à 9 %
As an important component of cloud platform, virtual switch (vSwitch) is responsible for achieving network connectivity between virtual machines (VMs) and external devices. Most existing vSwitches adopt the split design principle, which destroys the isolation between VMs. In vSwitch, different VMs compete for shared resources and unrestricted memory access, making them unable to guarantee stable network quality of service (QoS), while facing the risk of data plane attacks and illegal access to memory. In order to solve these performance, failure and security problems caused by the lack of isolation, the main works and contributions of this thesis are as follows: 1) Network QoS method based on CPU cycle isolation (C2QoS). This approach secures VM network bandwidth by isolating concurrency from CPU resources, and at the same time reduces additional VM network latency caused by concurrency by 80%. 2) Data plane attack defense mechanism based on stream table isolation (D-TSE). D-TSE uses VM as the unit to separate the flow table structure to achieve independent packet classification performance and fault isolation at the cost of 5% additional CPU usage. 3) Virtualized Network I/O (VNIO) mechanism based on Memory Access Isolation (S2H). Based on a secure memory sharing model, S2H provides VM memory isolation and security at the cost of 2-9% increased latency
APA, Harvard, Vancouver, ISO, and other styles
3

Schwarz, Oliver. "No Hypervisor Is an Island : System-wide Isolation Guarantees for Low Level Code." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-192466.

Full text
Abstract:
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. At the same time, our devices – for instance mobile phones and TVs – have become more complex, connected, and open for the execution of third-party software. Operating systems should separate untrusted software from confidential data and critical services. But their vulnerabilities often allow malware to break the separation and isolation they are designed to provide. To strengthen protection of select assets, security research has started to create complementary machinery such as security hypervisors and separation kernels, whose sole task is separation and isolation. The reduced size of these solutions allows for thorough inspection, both manual and automated. In some cases, formal methods are applied to create mathematical proofs on the security of these systems. The actual isolation solutions themselves are carefully analyzed and included software is often even verified on binary level. The role of other software and hardware for the overall system security has received less attention so far. The subject of this thesis is to shed light on these aspects, mainly on (i) unprivileged third-party code and its ability to influence security, (ii) peripheral devices with direct access to memory, and (iii) boot code and how we can selectively enable and disable isolation services without compromising security. The papers included in this thesis are both design and verification oriented, however, with an emphasis on the analysis of instruction set architectures. With the help of a theorem prover, we implemented various types of machinery for the automated information flow analysis of several processor architectures. The analysis is guaranteed to be both sound and accurate.
Förr skrevs skadlig mjukvara mest av nyfikna tonåringar. Idag är våra datorer under ständig hot från statliga organisationer, kriminella grupper, och kanske till och med våra affärskonkurrenter. Vissa besitter stor kompetens och kan utföra fokuserade attacker. Samtidigt har tekniken runtomkring oss (såsom mobiltelefoner och tv-apparater) blivit mer komplex, uppkopplad och öppen för att exekvera mjukvara från tredje part. Operativsystem borde egentligen isolera känslig data och kritiska tjänster från mjukvara som inte är trovärdig. Men deras sårbarheter gör det oftast möjligt för skadlig mjukvara att ta sig förbi operativsystemens säkerhetsmekanismer. Detta har lett till utveckling av kompletterande verktyg vars enda funktion är att förbättra isolering av utvalda känsliga resurser. Speciella virtualiseringsmjukvaror och separationskärnor är exempel på sådana verktyg. Eftersom sådana lösningar kan utvecklas med relativt liten källkod, är det möjligt att analysera dem noggrant, både manuellt och automatiskt. I några fall används formella metoder för att generera matematiska bevis på att systemet är säkert. Själva isoleringsmjukvaran är oftast utförligt verifierad, ibland till och med på assemblernivå. Dock så har andra komponenters påverkan på systemets säkerhet hittills fått mindre uppmärksamhet, både när det gäller hårdvara och annan mjukvara. Den här avhandlingen försöker belysa dessa aspekter, huvudsakligen (i) oprivilegierad kod från tredje part och hur den kan påverka säkerheten, (ii) periferienheter med direkt tillgång till minnet och (iii) startkoden, samt hur man kan aktivera och deaktivera isolationstjänster på ett säkert sätt utan att starta om systemet. Avhandlingen är baserad på sex tidigare publikationer som handlar om både design- och verifikationsaspekter, men mest om säkerhetsanalys av instruktionsuppsättningar. Baserat på en teorembevisare har vi utvecklat olika verktyg för den automatiska informationsflödesanalysen av processorer. Vi har använt dessa verktyg för att tydliggöra vilka register oprivilegierad mjukvara har tillgång till på ARM- och MIPS-maskiner. Denna analys är garanterad att vara både korrekt och precis. Så vitt vi vet är vi de första som har publicerat en lösning för automatisk analys och bevis av informationsflödesegenskaper i standardinstruktionsuppsättningar.

QC 20160919


PROSPER
HASPOC
APA, Harvard, Vancouver, ISO, and other styles
4

Wei-JianSu and 蘇偉戩. "VSSD: a Virtual SSD Framework with Performance Isolation Guarantee." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/58414628621860257729.

Full text
Abstract:
碩士
國立成功大學
資訊工程學系碩博士班
101
With updating development of modern technology, the solid-state drives (SSDs) have been expected as the next generation storage device. This paper wants to achieve virtual storage method in NAND-flash based SSD and isolation performance for every user. But the SSD’s device characteristic is very different from Hard Disk Drive (HDD), which caused past virtual storage method is hard to achieve performance isolation in SSD. The SSD’s GC overhead, internal parallelism and the device queuing delay caused that past virtual storage methods have unfair performance because their storage resource accounting of per user is hard to predict. VSSD brings up a novel virtual storage method and is designed in the Flash Translation Layer (FTL) of SSD to solve these problems. Our experiment shows that VSSD has best fair throughput performance, which can easily separate the GC overhead for every user with their data characteristic.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Isolation guarantee"

1

Benelli, Caterina. "Memorie autobiografiche come patrimonio di comunità." In Studi e saggi, 65–75. Florence: Firenze University Press, 2019. http://dx.doi.org/10.36253/978-88-5518-009-2.09.

Full text
Abstract:
We live in a historical period in which it is necessary and urgent to know and relate to stories. Today, the social function of memory is stronger and more evident than ever. The concept of memory, as well as that of recollection, is widely used, but those who resort to it are not always able to fully grasp its meaning. As a matter of fact, the educational function of memory is also expressed through narration. There is no narration and writing of oneself that does not bring within the testimony of a historical time, of a social group and of a precise epoch that reveals unusual nuances and situations, eager to be discovered and to become part of the social heritage. The oral and written narration allows narrators to feel part of a community, to feel in a "warm" place, in a comfortable area and part of a community rich in mutual interest and able to guarantee the rights of all and a reciprocal recognition. Addressing the question of the memory of a community in an era of fragility, of borders, of spaces shared more and more virtually and less physically, means to contrast isolation and the relational distance between people. Life stories provide us with descriptions and observations of how we live in a place, in a territory, in a family, in a school, in a company, in any situation in which human beings have exchanged stories and have learned from each other. The intent to collect the memories of the community, through life stories, autobiographies, arises from the need to look at the traces left by those who preceded us to better understand and face the future, that is, to pay attention to micro-stories. This contribution aims at reflecting on the educational and social value of autobiographies as important instruments for observation, investigation, analysis and restitution of new insights on the community through the educator’s role as a facilitator with autobiographical skills.
APA, Harvard, Vancouver, ISO, and other styles
2

Shaikh, Salman Ahmed, Dong Chao, Kazuya Nishimura, and Hiroyuki Kitagawa. "Incremental Continuous Query Processing over Streams and Relations with Isolation Guarantees." In Lecture Notes in Computer Science, 321–35. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44403-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Müller, Marcel, Anthony Simonet-Boulogne, Souvik Sengupta, and Oliver Beige. "Process Mining in Trusted Execution Environments: Towards Hardware Guarantees for Trust-Aware Inter-organizational Process Analysis." In Lecture Notes in Business Information Processing, 369–81. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98581-3_27.

Full text
Abstract:
AbstractProcess mining techniques enable business process analysis on event logs extracted from information systems. Currently, industry applications and research in process mining predominantly analyze intra-organizational processes. Intra-organizational processes deal with the workflows within a single organization. However, analyzing inter-organizational processes across separate companies has the potential to generate further insights. Process analysts can use these insights for optimizations such as workflow improvements and process cost reductions. It is characteristic for inter-organization process analysis that it is not possible to uncover the insights by analyzing the event logs of a single organization in isolation. On the other hand, privacy and trust issues are a considerable obstacle to adopting inter-organizational process mining applications. The independent companies fear competitive disadvantages by letting third parties access their valuable process logs. This paper proposes a concept for inter-organizational process mining using trusted execution environments in a decentralized cloud. The hardware-based approach aims to technically prevent data leakage to unauthorized parties without the need for a trusted intermediary. The contributions of this paper are theoretical and identify future research challenges for implementing the concept.
APA, Harvard, Vancouver, ISO, and other styles
4

Almond, Brenda. "Permanent relations? Love, marriage, and philosophical lives." In The Fragmenting Family, 22–43. Oxford University PressOxford, 2006. http://dx.doi.org/10.1093/oso/9780199267958.003.0003.

Full text
Abstract:
Abstract Being single is, for some, a lifestyle choice. Indeed, the very idea of the couple relationship can meet with reflective philosophical opposition from those who believe that, in a couple culture based on sexual exclusivity, authenticity is at risk for the coupled, and that their preoccupation with each other rebounds on those who are alone: a world of couples, they argue, imposes on the uncoupled the risk of social isolation and loneliness.¹ For others, though, the need for intimacy and security can best be met in a relationship that offers some guarantee of continuity.
APA, Harvard, Vancouver, ISO, and other styles
5

Emir, Astra. "7. Employment Protection." In Selwyn's Law of Employment, 213–42. Oxford University Press, 2022. http://dx.doi.org/10.1093/he/9780192858795.003.0007.

Full text
Abstract:
This chapter considers miscellaneous legal rights given to employees in the Employment Rights Act 1996 and other legislation. These are minimum standards which can be exceeded by agreement or negotiation, but they cannot be denied to an employee. The discussions cover guarantee payments (ERA, ss 28–35); suspension on medical grounds (ERA, ss 64–65) and time off work for various reasons, such as for public duties, study, or training, and for occupational pension scheme trustees. It also covers statutory sick pay including self-isolation due to Coronavirus; the scheme surrounding the Working Time Regulations 1998, and looks at the provisions of the regulations and their enforcement.
APA, Harvard, Vancouver, ISO, and other styles
6

Pedretti, Ana Soledad, Santiago Márquez Fosser, Roberto José Mercau Cossio, Jorge Ariel Esteban, Paz Rodriguez, Bernardo Julio Martinez, Santiago Andres Frid, et al. "Evaluation of Telehealth Service for COVID-19 Outpatients: A Dashboard to Measure Healthcare Quality and Safety." In MEDINFO 2021: One World, One Health – Global Partnership for Digital Innovation. IOS Press, 2022. http://dx.doi.org/10.3233/shti220098.

Full text
Abstract:
Due to the COVID-19 pandemic, changes and improvements regarding the organization have been made to adapt quickly at the Emergency Department (ED) of the Hospital Italiano de Buenos Aires, Argentina. This article describes the design, implementation, and use of an electronic dashboard which provided monitoring of patients discharged home, during follow-up with telehealth. It was useful to access essential information to organize and coordinate professional work and patients’ surveillance, providing highly relevant data in real-time as proxy variables for quality and safety during home isolation. The implemented tool innovated in the integration of technologies within a real context. The information management was crucial to optimize services and decision-making, as well to guarantee safety for healthcare workers and patients.
APA, Harvard, Vancouver, ISO, and other styles
7

Stender, Jan, Michael Berlin, and Alexander Reinefeld. "XtreemFS." In Data Intensive Storage Services for Cloud Environments, 267–85. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3934-8.ch016.

Full text
Abstract:
Cloud computing poses new challenges to data storage. While cloud providers use shared distributed hardware, which is inherently unreliable and insecure, cloud users expect their data to be safely and securely stored, available at any time, and accessible in the same way as their locally stored data. In this chapter, the authors present XtreemFS, a file system for the cloud. XtreemFS reconciles the need of cloud providers for cheap scale-out storage solutions with that of cloud users for a reliable, secure, and easy data access. The main contributions of the chapter are: a description of the internal architecture of XtreemFS, which presents an approach to build large-scale distributed POSIX-compliant file systems on top of cheap, off-the-shelf hardware; a description of the XtreemFS security infrastructure, which guarantees an isolation of individual users despite shared and insecure storage and network resources; a comprehensive overview of replication mechanisms in XtreemFS, which guarantee consistency, availability, and durability of data in the face of component failures; an overview of the snapshot infrastructure of XtreemFS, which allows to capture and freeze momentary states of the file system in a scalable and fault-tolerant fashion. The authors also compare XtreemFS with existing solutions and argue for its practicability and potential in the cloud storage market.
APA, Harvard, Vancouver, ISO, and other styles
8

Hieker, Carola, and Maia Rushby. "Diversity in the Workplace." In Handbook of Research on Human Factors in Contemporary Workforce Development, 308–32. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2568-4.ch014.

Full text
Abstract:
The ‘diversity in the workforce' chapter looks at the current status of gender diversity in the workplace and describes initiatives that are commonly designed and implemented by organizations for their female workforce and their senior leaders in pursuit of gender parity. It is emphasized that one or two interventions in isolation will not guarantee gender parity but that a combination of interventions is necessary, depending on the size and complexity of the organization. Furthermore, it is underlined that if these interventions are perceived as attractive by senior leaders then the senior leaders should be encouraged to invest time and resources in pursuing them. It will raise their commitment to become diversity champions, which is key for sustainable change. Examples from finance and professional service firms illustrate how some of the described interventions are used to enhance diversity.
APA, Harvard, Vancouver, ISO, and other styles
9

Hieker, Carola, and Maia Rushby. "Diversity in the Workplace." In Gender Economics, 176–99. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7510-8.ch008.

Full text
Abstract:
The ‘diversity in the workforce' chapter looks at the current status of gender diversity in the workplace and describes initiatives that are commonly designed and implemented by organizations for their female workforce and their senior leaders in pursuit of gender parity. It is emphasized that one or two interventions in isolation will not guarantee gender parity but that a combination of interventions is necessary, depending on the size and complexity of the organization. Furthermore, it is underlined that if these interventions are perceived as attractive by senior leaders then the senior leaders should be encouraged to invest time and resources in pursuing them. It will raise their commitment to become diversity champions, which is key for sustainable change. Examples from finance and professional service firms illustrate how some of the described interventions are used to enhance diversity.
APA, Harvard, Vancouver, ISO, and other styles
10

Koroleva, E. A. "Analysis of Credit and Investment Institutions for Smes." In Theory and Practice of Institutional Reforms in Russia: Collection of Scientific Works. Issue 50, 70–80. CEMI Russian Academy of Sciences, 2020. http://dx.doi.org/10.33276/978-5-8211-0788-6-70-80.

Full text
Abstract:
The article is devoted to a review of the main institutions operating in the market of credit and investment resources for Russian small and medium enterprises (SMEs). The work revealed disproportionality in providing Russian SMEs with financing: the largest share falls on own funds and usury, banks account for up to 20%, other sources are insignificant). Meanwhile, abroad, this structure is more diverse and balanced. The possibilities of individual credit and investment institutions for providing small enterprises with borrowed funds are analyzed using the example of collective financing institutions (business angels, crowdfunding and crowdinvesting sites); specialized (leasing, factoring and microfinance organizations) and state organizations (JSC “SME Corporation”, regional guarantee organizations, JSC “SME Bank”), as well as venture and banking companies. Actual tendencies occurring in various markets of financial resources for small firms are noted, taking into account the quarantine-isolation measures of 2020.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Isolation guarantee"

1

Yang, Gyeongsik, Yeonho Yoo, Minkoo Kang, Heesang Jin, and Chuck Yoo. "Bandwidth Isolation Guarantee for SDN Virtual Networks." In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications. IEEE, 2021. http://dx.doi.org/10.1109/infocom42981.2021.9488797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Luping, Wei Wang, and Bo Li. "Utopia: Near-optimal Coflow Scheduling with Isolation Guarantee." In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, 2018. http://dx.doi.org/10.1109/infocom.2018.8485970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Yinghao, Wei Wang, Jun Zhang, and Khaled Ben Letaief. "LACS: Load-Aware Cache Sharing with Isolation Guarantee." In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2019. http://dx.doi.org/10.1109/icdcs.2019.00029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krebs, Rouven, Philipp Schneider, and Nikolas Herbst. "Optimization Method for Request Admission Control to Guarantee Performance Isolation." In the 2nd International Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2649563.2649575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Zifan, Haipeng Dai, Bingchuan Tian, Wajid Rafique, and Wanchun Dou. "Efficient Coflow Scheduling of Multi-Stage Jobs with Isolation Guarantee." In 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom). IEEE, 2018. http://dx.doi.org/10.1109/bdcloud.2018.00053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Ye, Haiyang Jiang, Yongzheng Liang, Yulei Wu, Yilong Lv, Xing Li, and Gaogang Xie. "Isolation Guarantee for Efficient Virtualized Network I/O on Cloud Platform." In 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2020. http://dx.doi.org/10.1109/hpcc-smartcity-dss50907.2020.00042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zehl, Sven, Anatolij Zubow, and Adam Wolisz. "Hotspot slicer: Slicing virtualized home Wi-Fi networks for air-time guarantee and traffic isolation." In 2017 IEEE 18th International Symposium on " World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2017. http://dx.doi.org/10.1109/wowmom.2017.7974329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choi, Hojin, Hyuk Kwon, Junghee Lee, Yonghee Lee, and Kijoong Kim. "Hardware-Based Isolation Technique to Guarantee Availability of Security Controls in a Gateway for Industrial Networks." In 2023 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2023. http://dx.doi.org/10.1109/iceic57457.2023.10049871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Caruntu, Dumitru I., and Christopher Shove. "Overview of Payload Vibration Isolation Systems." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-82138.

Full text
Abstract:
This paper is an overview of recent spacecraft payload vibration isolation systems for further possible application to reusable launch vehicles sub-orbital missions. A summary of vibro-acoustic environment of Orbital Science and Kistler Aerospace’s small launch vehicles indicated a severe level of random vibrations, shock and acoustics that the payload must endure. The same level of random vibrations has been found for an entire family of sounding rockets: Black Brant, Orion, Nike-Orion, Taurus-Orion and Terrier-Orion. This paper also presents recent flight experiments designed to test either launch isolation or on-orbit isolation systems. While the on-orbit vibration isolation systems were active-passive systems, which lately used smart structures and new control algorithms including adaptive neural network-based, launch isolation systems evolved from passive to active-passive systems which were lately tested during the VALPE-2 experiment. Launch active-passive systems provided a vibration reduction 10 to 1 versus up to 5 to 1 provided by passive systems. Also, on-orbit active-passive systems provided a vibration reduction of about 10 to 1. Suborbital missions became very important due to the growing number of research projects dedicated to remote sensing of high resolution and effects of microgravity. The number of orbital and especially suborbital reusable launch missions is estimated to increase considerably in the near future as vehicles develop. The actual tendency is to reduce payload weight and mission costs, and to improve the payload environment. This requires more efficient vibration isolation systems that will guarantee payload safety and better operational performance for reusable launch vehicles.
APA, Harvard, Vancouver, ISO, and other styles
10

Erdogan, Julien Erdem, Mauro Sartori, Michal Ambor, and Stefano Barone. "Base Isolation for Seismic Retrofitting of Flexible Residential Building." In IABSE Congress, New York, New York 2019: The Evolving Metropolis. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2019. http://dx.doi.org/10.2749/newyork.2019.1029.

Full text
Abstract:
<p>Cities facing post-seismic event trauma frequently make the choice of base isolation technology for the retrofitting or reconstruction of their strategic facilities to guarantee the continuity of the services critical to their population. Consequently, most hospital and emergency buildings are base isolated in earthquake prone cities. On the contrary, the technology is very seldom used for residential buildings. In cities where a large part of the private housing building stock is made of 8 to 12-storey high RC frame buildings, two reasons are usually put forward to discard retrofitting by base isolation: the supposed high cost of the isolation system and its low efficiency due to its structural flexibility.</p><p>Two recent case studies demonstrate the relevance of base isolation for the retrofitting of typical RC frame housing building. The design of the retrofitting of an 11-storey RC frame structure in Mexico City will first be presented. The second case study will detail the Moda Building in Istanbul, a 10-storey RC structure for which seismic retrofitting has recently been completed using base isolation.</p><p>The base isolation retrofitting of these two flexible buildings will be detailed in this paper, demonstrating the efficiency of such a retrofitting solution for residential building, both in terms of cost and dynamic behavior..</p>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography