نتایج جستجو برای: requests
تعداد نتایج: 26503 فیلتر نتایج به سال:
Organizations have recently shown increased interest in database activity monitoring and anomaly detection techniques to safeguard their internal databases. Once an anomaly is detected, a response from the database is needed to contain the effects of the anomaly. However, the problem of issuing an appropriate response to a detected database anomaly has received little attention so far. In this ...
We present a scheme for reserving job resources with imprecise requests. Typical parameters such as the estimated runtime, the start time or the type or number of required CPUs need not be fixed at submission time but can be kept fuzzy in some aspects. Users may specify a list of preferences which guide the system in determining the best matching resources for the given job. Originally, the imp...
Indirect requests vary in politeness, for example, Can you tell me where Jordan Hall is? is more polite than Shouldn't you tell me where Jordan Hall is? By one theory, the more the literal meaning of a request implies personal benefits for the listener, within reason, the more polite is the request. This prediction was confirmed in Experiment I. Responses to indirect requests also vary in polit...
Advances in wireless and optical communication, as well as in Internet multicast protocols, make broadcast and multicast methods an effective solution to disseminate data. In particular, repetitive server-initiated broadcast is an effective technique in wireless systems and is a scalable solution to relieve Internet hot spots. A critical issue for the performance of multicast data dissemination...
For each patient sample that is presented to the clinical chemistry laboratory a combination of various tests can be requested. This combination or profile will depend on the condition of the patient, and hence also on the requesting hospital department. Several techniques were applied to detect and describe patterns in tests requested by the cardiology, hepatology and nephrology sections of th...
Usually, when connexion requests are added or removed from a network, for instance a WDM network, the routing of older connexions is not modified. Hence it is likely that after some additions and removings, the overall use of resources is far from optimal. In particular, a new request may be rejected, even if it could be added up to a whole rerouting of older requests. So operators have to reor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید