Availability

View this topic in
In telecommunications and reliability theory, the term availability has the following meanings: The degree to which a system, subsystem, or equipment is in a specified operable and committable state at the start of a mission, when the mission is called for at an unknown, i.e. , a random, time. Simply put, availability is the proportion of time a system is in a functioning condition. (Wikipedia.org)






Conferences related to Availability

Back to Top

2017 Annual Reliability and Maintainability Symposium (RAMS)

Tutorials and original papers on reliability, maintainability, safety, risk management, and logistics


2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)

The CCGrid symposium provides a major international forum for presenting and sharing recent research accomplishments and technological developments in the field of Cluster,Cloud and Grid computing. The symposium is attended by researchers and practitioners from both industry and academia. In 2013 the conference will be held in Chicago Illinois USA.

  • 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)

    All aspects of cluster, cloud and grid computing (architecture, resource management, programming models, etc.).

  • 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)

    The CCGrid symposium provides a major international forum for presenting and sharing recent research accomplishments and technological developments in the field of Cluster, Cloud and Grid computing. The symposium is attended by researchers and practitioners from both industry and academia. In 2012 the conference will be held in Ottawa, Canada.

  • 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)

    CCGrid 2011 is the eleventh in a series of successful international symposia will take place in Newport Beach, CA, USA. Grid Computing started as a generalization of Cluster Computing, promising to deliver large scale levels of parallelism to high-performance applications by crossing administrative boundaries. Moreover, the use of computational and data resources in high-performance applications, undertaken over Grid infrastructure, have started to now become a reality. Today we face the huge challenge of m

  • 2010 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)

    In 2010, CCGrid will return to Australia, to Melbourne, to celebrate its 10th anniversary. CCGrid 2010 will have a special focus on three important and immediate issues that are significantly influencing all aspects of Cluster, Cloud and Grid computing: Economics, Environment and Autonomics.

  • 2009 9th IEEE International Symposium on Cluster Computing and the Grid (CCGrid)

    Grid technology is establishing the way out of the academic incubator and into industry environments. The goal of CCGrid 2009 is to serve as an international forum for researchers and practitioners to present their innovative ideas and experiences in the multi-faceted areas of Cluster and Grid computing including emerging areas such as Cloud Computing.

  • 2008 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid)


2013 15th International Conference on Transparent Optical Networks (ICTON)

ICTON addresses applications of transparent and all optical technologies in telecommunication networks, systems, and components. ICTON topics are well balanced between basic optics and network engineering. Interactions between those two groups of professionals are a valuable merit of conference. ICTON combines high level invited talks with carefully selected regular submissions.

  • 2012 14th International Conference on Transparent Optical Networks (ICTON)

    ICTON addresses applications of transparent and all optical technologies in telecommunication networks, systems, and components. ICTON topics are well balanced between basic optics and network engineering. Interactions between those two groups of professionals are a valuable merit of conference. ICTON combines high level invited talks with carefully selected regular submissions.

  • 2011 13th International Conference on Transparent Optical Networks (ICTON)

    ICTON addresses applications of transparent and all optical technologies in telecommunication networks, systems, and components. ICTON topics are well balanced between basic optics and network engineering. Interactions between those two groups of professionals are a valuable merit of conference. ICTON combines high level invited talks with carefully selected regular submissions.

  • 2010 12th International Conference on Transparent Optical Networks (ICTON)

    ICTON addresses applications of transparent and all optical technologies in telecommunication networks, systems, and components. ICTON topics are well balanced between basic optics and network engineering. Interactions between those two groups of professionals are a valuable merit of conference. ICTON combines high level invited talks with carefully selected regular submissions.

  • 2009 11th International Conference on Transparent Optical Networks (ICTON 2009)

    ICTON scope is concentrated on the applications of transparent and all-optical technologies in telecommunication networks, systems, and components. ICTON topics are balanced between basic optics and network engineering. Interactions between those two groups of professionals are an important merit of conference. ICTON combines high level invited talks with regular submissions.

  • 2008 10th Anniversary International Conference on Transparent Optical Networks (ICTON 2008)

    ICTON is intended to promote advances in applications of transparent and all-optical technologies in broadband telecommunication networks, systems, and components. ICTON provides an interaction forum for network engineers from one side, and researchers in the field of physics, optics, device and material science from other side.


2013 6th International Conference on Robotics, Automation and Mechatronics (RAM)

The goal of the RAM 2013 is to bring together experts from the field of robotics, automation and mechatronics to discuss on the state-of-the-art and to present new research findings and perspectives of future developments.

  • 2011 IEEE 5th International Conference on Robotics, Automation and Mechatronics (RAM)

    The goal of the RAM 2011 is to bring together experts from the field of robotics, automation and mechatronics to discuss on the state-of-the-art and to present new research findings and perspectives of future developments with respect to the conference themes. The RAM 2011 is held in conjunction with the IEEE International Conference on Cybernetics and Intelligent Systems (CIS 2011)

  • 2008 IEEE Conference on Robotics, Automation and Mechatronics (RAM)

    The CIS-RAM 2008 is to bring together experts from the field of cybernetics, intelligent systems robotics, automation, and mechatronics to present and discuss new research findings and perspectives of future developments with respect to the conference themes.


2013 9th International Conference on the Design of Reliable Communication Networks (DRCN)

DRCN is a well established biennial forum for scientists on the reliability and availability of communication networks and services. The conference covers topics from equipment and technology for survivability to network management and public policy, through theory and techniques for survivable and robust networks and application design. The aim of the conference is to bring together people from industry, government and academia in those disciplines in a lively forum.


More Conferences

Periodicals related to Availability

Back to Top

Lightwave Technology, Journal of

All aspects of optical guided-wave science, technology, and engineering in the areas of fiber and cable technologies; active and passive guided-wave componentry (light sources, detectors, repeaters, switches, fiber sensors, etc.); integrated optics and optoelectronics; systems and subsystems; new applications; and unique field trials.


Network and Service Management, IEEE Transactions on

The online-only IEEE Transactions on Network and Service Management (TNSM) will be committed to the timely publication of archival-quality papers that advance the state-of-the-art and practical applications of network and service management. Both theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. This Transactions will focus on ...


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...


Reliability, IEEE Transactions on

Principles and practices of reliability, maintainability, and product liability pertaining to electrical and electronic equipment.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...




Xplore Articles related to Availability

Back to Top

Let the Sun Shine

Greg Byrd Computer, 2016

Clemson University students designed an inexpensive sensor node and cloud computing infrastructure to collect real-time, localized solar irradiation data. This data can be used by consumers and utilities to predict the availability of solar-generated electricity and to manage its use.


Slow Wave Structures for Miniature Antennas

John L. Volakis; Kubilay Sertel 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

Engineered materials, such as new composites, electromagnetic bandgap, and periodic structures have attracted considerable interest in recent years due to their remarkable and unique electromagnetic properties. Among this class of media are the magnetic photonic (MPC) and degenerate band edge (DBE) crystals. These periodic media have the concurrent characteristics of wave slow down and impedance matching at their dielectric interface. ...


Corporate network security

R. Oppliger; D. Hogrefe Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

The current, widespread use of computer networks has led to increased concerns about security. This paper deals with network security in general, and concentrates on corporate networks in particular. Passive and active attacks are outlined. Counter-measures to prevent corporate networks from being attacked are discussed. The security architecture for OSI networks is introduced. This architecture might be of interest for ...


Fine Grained Transaction Log for Data Recovery in Database Systems

Ge Fu; Hong Zhu; Yucai Feng; Yi Zhu; Jie Shi; Min Chen; Xueqiong Wang 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In ...


Model-Based Fault Diagnosis Applied to 6-pulse Cycloconverter

I. Illanes; J. Pontt; J. Rodriguez 2007 IEEE Power Electronics Specialists Conference, 2007

The motivation for this work is the need of study and reduction of current problems and faults affecting high- power AC drive systems. Availability and reliability of power electronics systems has a tremendous importance in mining applications, which is the reason why the knowledge on the fault mode behaviour of an AC drive system is extremely important from the idea ...


More Xplore Articles

Educational Resources on Availability

Back to Top

eLearning

Let the Sun Shine

Greg Byrd Computer, 2016

Clemson University students designed an inexpensive sensor node and cloud computing infrastructure to collect real-time, localized solar irradiation data. This data can be used by consumers and utilities to predict the availability of solar-generated electricity and to manage its use.


Slow Wave Structures for Miniature Antennas

John L. Volakis; Kubilay Sertel 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

Engineered materials, such as new composites, electromagnetic bandgap, and periodic structures have attracted considerable interest in recent years due to their remarkable and unique electromagnetic properties. Among this class of media are the magnetic photonic (MPC) and degenerate band edge (DBE) crystals. These periodic media have the concurrent characteristics of wave slow down and impedance matching at their dielectric interface. ...


Corporate network security

R. Oppliger; D. Hogrefe Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

The current, widespread use of computer networks has led to increased concerns about security. This paper deals with network security in general, and concentrates on corporate networks in particular. Passive and active attacks are outlined. Counter-measures to prevent corporate networks from being attacked are discussed. The security architecture for OSI networks is introduced. This architecture might be of interest for ...


Fine Grained Transaction Log for Data Recovery in Database Systems

Ge Fu; Hong Zhu; Yucai Feng; Yi Zhu; Jie Shi; Min Chen; Xueqiong Wang 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In ...


Model-Based Fault Diagnosis Applied to 6-pulse Cycloconverter

I. Illanes; J. Pontt; J. Rodriguez 2007 IEEE Power Electronics Specialists Conference, 2007

The motivation for this work is the need of study and reduction of current problems and faults affecting high- power AC drive systems. Availability and reliability of power electronics systems has a tremendous importance in mining applications, which is the reason why the knowledge on the fault mode behaviour of an AC drive system is extremely important from the idea ...


More eLearning Resources

IEEE-USA E-Books

  • Second Law of Thermodynamics

    This chapter contains sections titled: Introduction, Heat engine, Reversible and irreversible processes, Carnot engine, Carnot refrigerator and heat pump, The second law of thermodynamics, Carnot principle, Thermodynamic scales of temperature, Entropy, Entropy changes in irreversible processes, Relationship between entropy and other thermodynamic functions for systems of constant composition, Identity of the gas thermometer and thermodynamic scales of temperature, The perfect gas, Calculation of entropy changes, Zero of entropy, Joule-Thomson expansion, Isothermal Joule-Thomson experiment, Joule expansion, Speed of sound, Free energy functions, Zeros for G and A, Free energy changes in an irreversible process, Systems at equilibrium, Clapeyron's equation, Availability and maximum work, Use of availability in the analysis of processes, Problems, Answers, Notes

  • Data-Intensive Methods in Astronomy

    This chapter first briefly outlines the concept of the virtual observatory as a science response to the growing wealth of astronomical data and the increasing requirement to answer scientific questions using astronomical data from multiple sources. Then, it describes two examples of data-intensive applications from astronomy. The first example centers on running photometric classification algorithms on two existing sky survey databases to generate a catalog of quasars, while the second example outlines the derivation of constraints on cosmological parameters via weak gravitational lensing, which is one of the main science drivers for the next generation of sky surveys. This pair of examples illustrates some of the problems faced by modern astronomy, which require the development of new data-intensive methods and the availability of a computational infrastructure on which to run them.

  • Introduction

    This introductory chapter of Service Quality of Cloud-Based Applications presents an overview of the contents in the subsequent chapters of the book. The book methodically analyzes the impacts of cloud infrastructure impairments on application service delivered to end users, as well as the opportunities for improvement afforded by cloud. It considers both the new impairments and opportunities of virtualized resources offered to applications deployed on cloud and how user service quality experienced by end users can be maximized. It approaches application service quality from the end users perspective while considering standards and recommendations from NIST, TM Forum, QuEST Forum, ODCA, ISO, ITIL, and so on. The book provides application architects, developers, and testers guidance on architecting and engineering applications that meet their customers and end users service reliability, availability, quality, and latency expectations. The work is organized into three parts: context, analysis, and recommendations.

  • Cyber Security Prediction Models

    This chapter contains sections titled: Objectives Introduction Cyber Security Strategies Cyber Security Threat to the Internet Internet Vulnerabilities Cyber Security Threat to Critical Infrastructure Cyber Security Issues Cyber Security Theory Importance of Cyber Security Models Cyber Security Model Validation Data Resources Relationship of Availability and Security Measurements in Cyber Security Risk Model Exponential Model #1 Exponential Model #2 Vulnerability Model Development of Confidence Intervals for CERT Vulnerability Count Intrusion Model [SCH04] Relative Measures of Effectiveness Time Duration of Intrusions Model Summary This chapter contains sections titled: References

  • No title

    More and more historical texts are becoming available in digital form. Digitization of paper documents is motivated by the aim of preserving cultural heritage and making it more accessible, both to laypeople and scholars. As digital images cannot be searched for text, digitization projects increasingly strive to create digital text, which can be searched and otherwise automatically processed, in addition to facsimiles. Indeed, the emerging field of digital humanities heavily relies on the availability of digital text for its studies. Together with the increasing availability of historical texts in digital form, there is a growing interest in applying natural language processing (NLP) methods and tools to historical texts. However, the specific linguistic properties of historical texts -- the lack of standardized orthography, in particular -- pose special challenges for NLP. This book aims to give an introduction to NLP for historical texts and an overview of the state of the art in th s field. The book starts with an overview of methods for the acquisition of historical texts (scanning and OCR), discusses text encoding and annotation schemes, and presents examples of corpora of historical texts in a variety of languages. The book then discusses specific methods, such as creating part-of-speech taggers for historical languages or handling spelling variation. A final chapter analyzes the relationship between NLP and the digital humanities. Certain recently emerging textual genres, such as SMS, social media, and chat messages, or newsgroup and forum postings share a number of properties with historical texts, for example, nonstandard orthography and grammar, and profuse use of abbreviations. The methods and techniques required for the effective processing of historical texts are thus also of interest for research in other domains. Table of Contents: Introduction / NLP and Digital Humanities / Spelling in Historical Texts / Acquiring Historical Texts / Text Encoding an Annotation Schemes / Handling Spelling Variation / NLP Tools for Historical Languages / Historical Corpora / Conclusion / Bibliography

  • Availability Modeling

    This chapter contains sections titled: Definition of Availability Measures of Availability Computation of Availability

  • Secure Communication in Distributed Sensor Networks (DSN)

    The motivation of this chapter is to study the issues related to secure communication among sensor nodes. Sensor nodes are usually of limited computational ability having low CPU power, a small amount of memory, and constrained power availability. Thus the standard cryptographic algorithms suitable for state of the art computers may not be efficiently implemented in sensor nodes. In this regard we study the strategies that can work in constrained environments. First we present a basic introduction to the security issues in distributed wireless sensor networks. As implementation of public key infrastructure may not be recommendable in low end hardware platforms, we describe key predistribution issues in detail. Further we study some specific stream ciphers for encrypted communication that are suitable for implementation in low end hardware.

  • Survivability and Fault Tolerance in the Cloud

    In recent years, cloud computing has emerged as a successful model to offer computing resources in an on-demand manner for large-scale Internet services and applications. However many companies are still reluctant to embrace the cloud. This chapter provides a comprehensive study of fundamental concepts and techniques related to survivability and reliability in cloud computing environments. It first lays out key concepts of the cloud computing model and concepts related to survivability. Then it presents an overview of the outcomes of recent analyses of failures in the cloud. The chapter further reviews and discusses existing techniques aimed at improving fault tolerance and availability of cloud services. The ultimate goal is to develop a comprehensive understanding of state-of-the-art solutions for improving cloud survivability and reliability, and to provide insights into the critical challenges to be addressed in the future.

  • Application Service Quality

    This chapter considers the service offered by applications to end users and the metrics used to characterize the quality of that service. A handful of common service quality metrics that characterize application service quality are detailed. These user service key quality indicators (KQIs) are considered in depth. A simple cloud-based application with a pool of frontend components distributing work across a pool of backend components is illustrated. The chapter then focuses on two high-level application service boundaries: Application's customer facing service (CFS) boundary and Application's resource facing service (RFS) boundary. While different applications offer different functionality to end users, the primary service KQIs across the application's customer facing service boundary for end users of applications generally include one or more of the following: service availability; service latency; service reliability; service accessibility; service retainability; service throughput; service timestamp accuracy and application specific service quality measurements.

  • A Summary of HighTemperature Electronics Research and Development

    Current and future needs in automotive, aircraft, space, military, and well logging industries require operation of electronicsat higher temperaturesthan today's accepted limit of 395 K. Without the availability of high-temperature electronics, many systems must operate under derated conditions or must accept severe mass penalties required by coolant systems to maintain electronic temperatures below critical levels. This paper presents ongoing research and development in the electronics community to bring high-temperature electronics to commercial realization. Much of this work was recently reviewed at the FIRST International High-Temperature Electronics Conference held 16-20 June 1991 in Albuquerque, New Mexico.



Standards related to Availability

Back to Top

IEEE Recommended Practice for Communications-Based Train Control (CBTC) System Design and Functional Allocations

This recommended practice establishes a preferred system design and functional allocation for CBTC systems.


IEEE Standard Definitions for Use in Reporting Electric Generating Unit Reliability, Availability, and Productivity

This document standardizes terminology and indexes for reporting electric generating unit reliability, availability, and productivity performance measures while recognizing the power industry’s needs, including marketplace competition. This standard also includes equations for equivalent demand forced outage rate (EFORd), newly identified outage states, discussion of commercial availability, energy weighted equations for group performance indexes, definitions of outside management control (OMC), pooling ...


IEEE Standard Dictionary of Measures of the Software Aspects of Dependability

This standard specifies and classifies measures of the software aspects of dependability. It is an expansion of the scope of the existing standard; the revision includes the following aspects of dependability: reliability, availability, and maintainability of software. The applicability of this standard is any software system; in particular, it applies to mission critical systems, where high reliability, availability, and maintainability ...


IEEE Standard for Communications-Based Train Control (CBTC) Performance and Functional Requirements

Original Scope: This standard establishes a set of performance and functional requirements necessary for enhancing performance, availability, operations, and train protection using a CBTC System.---Revision: There is no change to the words of the scope. The revisions allow for driverless train operation, including automatic people movers.


IEEE Standard for User Interface Requirements in Communications-Based Train Control (CBTC) Systems

This standard establishes user interface requirements in communications-based train control (CBTC) systems.



Jobs related to Availability

Back to Top