نتایج جستجو برای: safer management
تعداد نتایج: 864543 فیلتر نتایج به سال:
Many of the > 83,000 chemicals currently used in commerce pose potential toxic hazards to human health and the environment. Numerous policies and systems are in place to try to identify harmful chemicals that are already in use, but removing these problem chemicals once they are already in the marketplace can be difficult, time-consuming, and costly. In an ideal world, chemists would be able to...
Air traffic control is a complex, safety-critical activity, with well-established and successful work practices. Yet many attempts to automate the existing system have failed because controllers remain attached to a key work artifact: the paper flight strip. This article describes a four-month intensive study of a team of Paris en route controllers in order to understand their use of paper flig...
Professional programmers are well aware that debugging, testing, code inspection, etc. are part and parcel of software development. Requiring end users to carry out the same activities to reduce spreadsheet errors might be asking too much. For one thing, they lack the expertise and for another, they might not be willing to invest the time and effort required by these activities. For example, te...
Sanitation and process control costs increased the costs of producing meat and poultry by about 0.5 percent in the period preceding the promulgation of the Pathogen Reduction/Hazard Analysis and Critical Control Point (PR/HACCP) rule of 1996. However, there was no benefit in trying to avoid these costs. Large slaughter plants and all further-processing plants with poor performance of sanitation...
This paper investigates the degradation properties of Boolean functions from the aspects of the distributions of differences and linear masks, and shows two characterizations of the degraded Boolean function. One is that there exists a linear space of the input differences, where the differentials with the zero output difference have probability 1; Another one is that the input linear masks of ...
Computer forensic practitioners must gather, analyse and present evidence at court. A method of data gathering called live forensic acquisition is often used. This method involves gathering data from a system without shutting it down and allows forensic practitioners to access a large quantity of valuable information. However, as data on the computer is constantly changing the copy of data take...
This report describes impossible differential (ID) attacks on 3.75round SAFER SK-64, using 2 chosen texts, 2 memory, and 2 time. Moreover, an ID attack on both 2.75-round SAFER+ and on 2.75-round SAFER++ uses 2 data, 2 memory, and 2 time. We used the miss-in-the-middle technique developed by Biham et al. These attacks do not endanger the security of SAFER ciphers, and indicate that ID attacks w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید