Liu, Lei, 1968-
Security and policy driven computing [electronic resource] / Lei Liu. - Boca Raton, Fla. : CRC Press, c2011. - xv, 274 p. : ill.
Includes bibliographical references and index.
1. A parallel search optimization using an adaptive state-action index structure -- 2. A method of policy discovery for storage and data management -- 3. Knowledge-based policy discovery for storage and data management -- 4. Stabilizing read-write throughput of transactional memory for contention management -- 5. Parallel search optimization for storage virtualization -- 6. Finite automata for evaluating testbed resource contention -- 7. Adaptive buffer tuning for data intensive algebraic operations -- 8. A quantum method of representing recurring data deduplication policy states -- 9. QAM : quantum availability mechanics without recovery for storage and data management -- 10. A quantum method with unknown future tasks to resolve storage message conflicts -- 11. A quantum automatic controlled method for storage test coverage -- 12. Protection mechanics with a quantum operator for anomaly attacks.
Mode of access: World Wide Web.
9781439825808 (ebook : PDF)
Computer security.
Computer networks--Security measures.
Computer networks--Automatic control.
Computer networks--Management.
Self-adaptive software.
Electronic books.
Security and policy driven computing [electronic resource] / Lei Liu. - Boca Raton, Fla. : CRC Press, c2011. - xv, 274 p. : ill.
Includes bibliographical references and index.
1. A parallel search optimization using an adaptive state-action index structure -- 2. A method of policy discovery for storage and data management -- 3. Knowledge-based policy discovery for storage and data management -- 4. Stabilizing read-write throughput of transactional memory for contention management -- 5. Parallel search optimization for storage virtualization -- 6. Finite automata for evaluating testbed resource contention -- 7. Adaptive buffer tuning for data intensive algebraic operations -- 8. A quantum method of representing recurring data deduplication policy states -- 9. QAM : quantum availability mechanics without recovery for storage and data management -- 10. A quantum method with unknown future tasks to resolve storage message conflicts -- 11. A quantum automatic controlled method for storage test coverage -- 12. Protection mechanics with a quantum operator for anomaly attacks.
Mode of access: World Wide Web.
9781439825808 (ebook : PDF)
Computer security.
Computer networks--Security measures.
Computer networks--Automatic control.
Computer networks--Management.
Self-adaptive software.
Electronic books.