Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,091 papers from all fields of science
Search
Sign In
Create Free Account
Unavailability
Known as:
Unavailable
Unavailability is the probability that an item will not operate correctly at a given time and under specified conditions. It opposes availability…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Downtime
High availability
Broader (1)
Systems engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
The PORSCE II framework: using AI planning for automated Semantic Web service composition
O. Hatzi
,
D. Vrakas
,
Nick Bassiliades
,
D. Anagnostopoulos
,
I. Vlahavas
Knowledge engineering review (Print)
2013
Corpus ID: 7839356
Abstract This paper presents PORSCE II, an integrated system that performs automatic Semantic Web service composition exploiting…
Expand
2009
2009
Analysis of Ethernet Powerlink Wireless Extensions Based on the IEEE 802.11 WLAN
Lucia Seno
,
S. Vitturi
,
C. Zunino
IEEE Transactions on Industrial Informatics
2009
Corpus ID: 13998007
The industrial communication scenario is experiencing the introduction of wireless networks at all levels of factory automation…
Expand
Highly Cited
2008
Highly Cited
2008
An evolutionary stage model of outsourcing and competence destruction: A Triad comparison of the consumer electronics industry
Masaaki Kotabe
,
M. Mol
,
Sonia Ketkar
2008
Corpus ID: 62895949
Abstract and Key Results•Outsourcing has gained much prominence in managerial practice and academic discussions in the last two…
Expand
Highly Cited
2007
Highly Cited
2007
On Implementing Graph Cuts on CUDA
Mohamed E. Hussein
,
A. Varshney
,
Larry Davis
2007
Corpus ID: 9357297
The Compute Unified Device Architecture (CUDA) has enabled graphics processors to be explicitly programmed as general-purpose…
Expand
Highly Cited
2002
Highly Cited
2002
E-commerce processes: a study of criticality
G. Duffy
,
B. Dale
Industrial management & data systems
2002
Corpus ID: 6031986
This paper, based on interviews undertaken with consultants experienced in e‐commerce engagements, has identified ten process…
Expand
1999
1999
An analytical comparison of the client-server, remote evaluation and mobile agents paradigms
A. Puliafito
,
S. Riccobene
,
Marco Scarpa
Proceedings. First and Third International…
1999
Corpus ID: 14083138
We deal with the study of the actual convenience of using the agent programming paradigm for accessing distributed service. We…
Expand
Review
1998
Review
1998
Sexual activity of out-of-school youth, and their knowledge and attitude about STDs and HIV/AIDS in Southern Ethiopia
N. Taffa,
1998
Corpus ID: 67774132
Abstract: A cross-sectional survey on sexual activity of out-of-school youth (15-24 years), and their knowledge and attitude…
Expand
1994
1994
A Security Architecture for Fault-Toerant Systems
M. Reiter
,
K. Birman
,
R. V. Renesse
ACM Transactions on Computer Systems
1994
Corpus ID: 3175670
Review
1988
Review
1988
RF BREAKDOWN STUDIES IN ROOM TEMPERATURE ELECTRON LINAC STRUCTURES
G. Loew
,
J. Wang
1988
Corpus ID: 16599859
This paper is an overall review of studies carried out by the authors and some of their colleagues on RF breakdown, Field…
Expand
Highly Cited
1987
Highly Cited
1987
A Probabilistic Framework for Resource-Constrained Multi-Agent Planning
N. Muscettola
,
Stephen F. Smith
International Joint Conference on Artificial…
1987
Corpus ID: 14088411
In this paper, we consider the problem of temporally coordinating the resource demands of a set of independent agents. We assume…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE