Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,975,956 papers from all fields of science
Search
Sign In
Create Free Account
Software deployment
Known as:
Deployment framework
, Deployment
, Software delivery
Expand
Software deployment is all of the activities that make a software system available for use. The general deployment process consists of several…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adaptation (computer science)
Ansible
Apache Axis
Apache Commons
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
UK Electricity Market Reform and the Energy Transition: Emerging Lessons
M. Grubb
,
D. Newbery
Energy Journal
2018
Corpus ID: 158849769
The 2013 Electricity Market Reform (EMR) was a response to problems of delivering reliability with a growing share of renewables…
Expand
Highly Cited
2014
Highly Cited
2014
Joint physical-application layer security for wireless multimedia delivery
Liang Zhou
,
Dan Wu
,
B. Zheng
,
M. Guizani
IEEE Communications Magazine
2014
Corpus ID: 4857662
In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless…
Expand
Highly Cited
2012
Highly Cited
2012
Comparison of open-source cloud management platforms: OpenStack and OpenNebula
Xiaolong Wen
,
Genqiang Gu
,
Qingchun Li
,
Yun Gao
,
Xuejie Zhang
International Conference on Fuzzy Systems and…
2012
Corpus ID: 20703511
Cloud management platforms may manage the resources provided by the infrastructure as a service (IaaS) cloud. With the rapid…
Expand
Highly Cited
2010
Highly Cited
2010
A mobility management scheme for wireless mesh networks based on a hybrid routing protocol
Rongsheng Huang
,
Chi Zhang
,
Yuguang Fang
Comput. Networks
2010
Corpus ID: 16641071
Highly Cited
2008
Highly Cited
2008
Wireless relays for broadband access [radio communications series]
D. Soldani
,
S. Dixit
IEEE Communications Magazine
2008
Corpus ID: 28268494
This article presents the outlook of the overall broadband market and operators' challenges in offering profitable mass market…
Expand
Highly Cited
2006
Highly Cited
2006
Why does it pay to be selfish in a MANET?
Younghwan Yoo
,
D. Agrawal
IEEE wireless communications
2006
Corpus ID: 2832040
Routing protocols for a mobile ad hoc network have assumed that all mobile nodes voluntarily participate in forwarding others…
Expand
Highly Cited
2005
Highly Cited
2005
Stream programming on general-purpose processors
J. Gummaraju
,
M. Rosenblum
Micro
2005
Corpus ID: 2435586
In this paper we investigate mapping stream programs (i.e., programs written in a streaming style for streaming architectures…
Expand
Highly Cited
2004
Highly Cited
2004
Collapsar: A VM-Based Architecture for Network Attack Detention Center
Xuxian Jiang
,
Dongyan Xu
USENIX Security Symposium
2004
Corpus ID: 5883342
The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though…
Expand
Highly Cited
2000
Highly Cited
2000
Analysis and improvement of fairness between TCP Reno and Vegas for deployment of TCP Vegas to the Internet
G. Hasegawa
,
Kenji Kurata
,
M. Murata
Proceedings International Conference on Network…
2000
Corpus ID: 15582947
According to past research, a TCP Vegas version is able to achieve higher throughput than TCP Tahoe and Reno versions, which are…
Expand
Highly Cited
1997
Highly Cited
1997
Knowledge Management: An Emerging Discipline
S. Shariq
Journal of Knowledge Management
1997
Corpus ID: 20210475
Society is entering into an era where the future essentially will be determined by people’s ability to wisely use knowledge, a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE