iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Virtual
جزئیات خدمات ترجمه در ترجمه تخصصی
formation
virtualization
virtual
virtual
virtual
applications
FutureGenerationComputerSystems ( ) –
FutureGenerationComputerSystems29(2013)1408–1416
FutureGenerationComputerSystems29(2013)1408–1416
Javier de Cos Ruiz Abstract In the context of the
An adaptive model of virtual enterprise based on dynamic web service
a nationaldisability charity for the United Kingdom that focuses on
Available online at www.sciencedirect.com
MIT OpenCourseWare
CLOUD SERVICES DEPLOYMENT MODEL There are different types of deployment
There are different types of deployment model depending on the
SECURITY ISSUES OF CLOUD COMPUTING Security issues of cloud computing
Archana Pawar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 928-933
REVIEW ARTICLE
REVIEW ARTICLE
J.ParallelDistrib.Comput.72(2012)525–535
Malware threatens virtual machines, according to report
0
1
1 The Challenges of Virtual Teaming J ill N emiro
Organization and Leadership
Available online at www.sciencedirect.com
�ترجمه
CHAPTER 9
confl icts face - to - face tended to escalate the confl icts from task - related to per-
247 Leading Virtual Teams Potential Problems and Simple Solutions Thomas
confl icts face - to - face tended to escalate the confl icts from task - related to per-
confl icts face - to - face tended to escalate the confl icts from task - related to per-
CHAPTER 10
Eur. Phys. J. C (2012) 72:1960
Eur. Phys. J. C (2012) 72:1960
Eur. Phys. J. C (2012) 72:1960
CHAPTER
COORDINATION Virtual teams may take longer to perform their work
Hambley It is difficult to overemphasize the importance of good
Hambley It is difficult to overemphasize the importance of good
Hambley It is difficult to overemphasize the importance of good
247 Leading Virtual Teams Potential Problems and Simple Solutions Thomas
Hambley It is difficult to overemphasize the importance of good
Weighing the rules of justice and the role of individual
Weighing the rules of justice and the role of individual
Weighing the rules of justice and the role of individual
2011 Fourth International Conference on Intelligent Networks and Intelligent Systems
2011 Fourth International Conference on Intelligent Networks and Intelligent Systems
Dave Nelson
1
1
re definitely gonna wanna have is a virtual device or
re definitely gonna wanna have is a virtual device or
1
re definitely gonna wanna have is a virtual device or
1
1
2 3 2 C h a p t e r 1 3 • U n d e r s t a n d i n g A v a i l a b i l i t y
1 A mission is a task or process that is
are the objects in the environment that are relevant to
CHAPTER 8
1 A mission is a task or process that is
Comparison of Several Cloud Computing Platforms
1 A mission is a task or process that is
Comparison of Several Cloud Computing Platforms
Journal of Materials Processing Technology 155–156 (2004) 1834–1838
Computers & Graphics 23 (1999) 389}403
CIRP Annals - Manufacturing Technology 61 (2012) 657–679
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
ISSN: 2321-7782 (Online)
Author's personal copy
Available online at www.sciencedirect.com
Hierarchical Disaster Tolerant Architecture Based on Virtual Storage Technology Abstract
it is difficult for computer security education to keep pace
the status of data is becoming increasing important in information
it is difficult for computer security education to keep pace
a Virtual Communities and Social Capital 9 Considering these types
2015 4th MEDIAN Workshop
2011 International Conference on Virtual Reality and Visualization
2011 International Conference on Virtual Reality and Visualization
FutureGenerationComputerSystems28(2012)379–390
FutureGenerationComputerSystems28(2012)379–390
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
Proceedings of the 22”d Annual EMBS International Conference, July 23-28,2000, Chicago IL.
FutureGenerationComputerSystems ( ) –
Your manuscript has been reviewed, and we regret to inform you that it has not been found suitable for
as may be seen in the enormous growth in mobile
as may be seen in the enormous growth in mobile
as may be seen in the enormous growth in mobile
clouds
Network Security Function Virtualization(NSFV) towards Cloud computing with NFV
*Manuscript
3. WSA - greement and WSAG4J
3. WSA - greement and WSAG4J
3. WSA - greement and WSAG4J
2011Academic Journals Full Length Research Paper Construction planning supported in
364 M. Ali et al./Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
intensive applications that are mission critical to your business perform
Zamani
J Supercomput
J Supercomput
J Supercomput
J Supercomput
Cloud Infrastructure
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before
D A T A S H E E T
®
®
Cloud Infrastructure
®
®
The Virtual Biennale Prague takes place both in a virtual
Cloud Infrastructure
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before
Automatic software deployment using user-level virtualization for cloud-computing
Journal of Workplace Learning
1
1
1
The Journal ofSystemsand Software 110 (2015) 122–135
Engineering Applications of Artificial Intelligence ∎ (∎∎∎∎) ∎∎∎–∎∎∎
realitymining can characterize places according to the activity and movement
realitymining can characterize places according to the activity and movement
realitymining can characterize places according to the activity and movement
realitymining can characterize places according to the activity and movement
The 11th International Conference on Parallel and Distributed Computing, Applications and Technologies
Licensed to:
Licensed to:
public Internet but rather in a virtual private network (VPN). publishing their sensor data on behalf of the polled
Mobile Netw Appl (2015) 20:4–18
P P a a r r t t I I I I I I :: C C ll o o u u d d C C o o m m p p u u t t ii n n g g a a t t W W o o r r k k
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Software-Defined Cloud Computing: Architectural
CICTP 2015 1016
Safety Science xxx (2016) xxx–xxx
Hoseinaei
Research scholar, TMU, Moradabad, INDIA JIT, Barabanki, INDIA
Increasing Reality and Educational Merits of a Virtual GameAbstract
FutureGenerationComputerSystems50(2015)62–74
FutureGenerationComputerSystems50(2015)62–74
FutureGenerationComputerSystems50(2015)62–74
Cloud computing aim to power the data centers as a
AASH: An Asymmetry-Aware Scheduler for Hypervisors
Abstract — Today’s world is an era of cloud computing. Cloud computing aim to power the data centers as a network
Chapter 2
Augmented reality Samsung SARI AR SDK marker less tracker used
Big Data Research 3 (2016) 24–28
Big Data Research 3 (2016) 24–28
Volume 5, Issue 6, June 2015 ISSN: 2277 128X
CHAPTER
Cluster Comput (2008) 11: 213–227
Software-Defined Cloud Computing: Architectural
Introduction Scalable computers have moved from the research lab to
A Virtual Machine Monitor Disco is a virtual machine monitor
Disco acts as a gateway that uses the network interfaces
Conclusions This paper tackles the problem of developing system software
EVALUATING PRODUCT PERCEPTION USING EYE-
The Virtual Foundry Releases Filamet 3D Printing Filament That Turns
BetweennessCentralityonGPUsandHeterogeneous
4 3
Journal of Analytical Psychology, 2015, 60, 2, 198–219
Journal of Analytical Psychology, 2015, 60, 2, 198–219
Int J Psychoanal (2015) 96:569–582 doi: 10.1111/1745-8315.12348
abstract Isolation and resource control for cloud applications has traditionally been achieve through the use of virtual machines.
00:00:00
00:00:00
00:00:00
کامپیوتر - اینترنت اشیا IOT
Automatic agent generation for IoT-based smart house simulator
..
Computer Networks 104 (2016) 55–65
Design and Evaluation of Learning Algorithms for
studied water footprint intensity spatial distribution patterns and evolution trends
ThesmartpowergridisanativeapplicationofIoTand Cloud technologiesastheintelligentmeters arehighly distributed andthey generate huge amount of
Management interfaces reside at various levels in the software stack
yet they present a serious threat due to rogue malicious
yet they present a serious threat due to rogue malicious
a considerably wide spectrum of attacks on hardware virtualization has
the adversary could detect and identify the virtual system he
COMPROMISING THE HOST OS One of the most appealing targets
Virtual machine migration makes system deployment fast and easy by
COMPROMISING THE HOST OS One of the most appealing targets
the adversary could detect and identify the virtual system he
Available online at www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCC.2016.2570752, IEEE
WHITE PAPER
Computers & Education 62 (2013) 41–49
VIRTUAL WORLD, VIRTUAL LAND BUT REAL PROPERTY
Singapore Journal of Legal Studies
168 Essentials of Cloud Computing
168 Essentials of Cloud Computing
Nils Müller is convinced that paper is not on the
http://tarjomebazar.com
®
A Multi-Broker Platform for the Internet
168 Essentials of Cloud Computing
Parallels RAS v16 Virtual application and desktop delivery can be
■
77707
■
■
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
Abstract
79276
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
COVER FEA TURE
Optimizing Desktop
Cross-Site Virtual
Sci Pharm. 2008; 76: 333–360 doi:10.3797/scipharm.0803-03 333
Neurocomputing 284 (2018) 1–9
Neurocomputing 284 (2018) 1–9
there is an increasing interest to integrate prime moverswith dc
A survey of real locomotion techniques for immersive virtual reality applications on head-mounted displays
December 5, 2019 Distributed Systems
علاوه بر مطالعه کتاب و اخذ دانش آکادمیک از نظر
پیاده سازی پروژه ها بصورت گروهی در عمق بخشیدن به
Transitioned
© 2017 IJEDR | Volume 5, Issue 2 | ISSN: 2321-9939
Using the Geo IP block list The FortiGuard Geo IP
قوانین کاربری سایت blockchain.com
مقاله آخر
Proceedings of the 2020 Winter Simulation Conference
BROCHURE