منابع مشابه
Wrapper / Monitor Wrapper / Monitor Wrapper / Monitor
The topic of data warehousing encompasses architec-tures, algorithms, and tools for bringing together selected data from multiple databases or other information sources into a single repository, called a data warehouse , suitable for direct querying or analysis. In recent years data warehousing has become a prominent buz-zword in the database industry, but attention from the database research c...
متن کاملMonitor Logics for Quantitative Monitor Automata
In the last years, there has been increasing interest in quantitative features of the specification and analysis of systems. Such quantitative aspects include the consumption of a certain resource or the output of a benefit. Both weighted automata and weighted logics [7] are means to achieve this quantitative description of systems. They can be employed for both finite and infinite input. Very ...
متن کاملPassive neutron area monitor with CR39
Background: In high-intensity, mixed and pulsed neutron fields the use of spectrometers or area monitors with active detectors is useless in these conditions neutron measuring devices must have a passive detector. Here a passive neutron area monitor with CR39 track detector was designed and the response was calculated. Materials and Methods: The response of a passive neutron area monitor with C...
متن کاملDanger Controller Manoeuvre Monitor Danger Controller Manoeuvre Monitor Danger Controller Manoeuvre Monitor
| This paper describes the work currently developed at Heudiasyc and Liia within the Pro-Lab II demonstrator. This project started with the second phase of the European Prometheus/Pro-Art program. Its purpose is to develop an electronic co-pilot to assist the human driver. The global software architecture of the demonstrator, presented in 3], is structured in three main modules: perception , de...
متن کاملReference Monitor
Related Concepts – Access control – Access control policy – Security kernel Definition A reference monitor concept defines a set of design requirements on a reference validation mechanism, which enforces an access control policy over subjects' (e.g., processes and users) ability to perform operations (e.g., read and write) on objects (e.g., files and sockets) on a system. – The reference valida...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Chemometrics and Intelligent Laboratory Systems
سال: 2008
ISSN: 0169-7439
DOI: 10.1016/j.chemolab.2007.07.002