نتایج جستجو برای: safer management

تعداد نتایج: 864543  

2013
Linda S. Birnbaum

Many of the > 83,000 chemicals currently used in commerce pose potential toxic hazards to human health and the environment. Numerous policies and systems are in place to try to identify harmful chemicals that are already in use, but removing these problem chemicals once they are already in the marketplace can be difficult, time-consuming, and costly. In an ideal world, chemists would be able to...

2000
Wendy E. Mackay

Air traffic control is a complex, safety-critical activity, with well-established and successful work practices. Yet many attempts to automate the existing system have failed because controllers remain attached to a key work artifact: the paper flight strip. This article describes a four-month intensive study of a team of Paris en route controllers in order to understand their use of paper flig...

2004
Robin Abraham

Professional programmers are well aware that debugging, testing, code inspection, etc. are part and parcel of software development. Requiring end users to carry out the same activities to reduce spreadsheet errors might be asking too much. For one thing, they lack the expertise and for another, they might not be willing to invest the time and effort required by these activities. For example, te...

2003
Michael Ollinger

Sanitation and process control costs increased the costs of producing meat and poultry by about 0.5 percent in the period preceding the promulgation of the Pathogen Reduction/Hazard Analysis and Critical Control Point (PR/HACCP) rule of 1996. However, there was no benefit in trying to avoid these costs. Large slaughter plants and all further-processing plants with poor performance of sanitation...

Journal: :IACR Cryptology ePrint Archive 2016
Wentan Yi Shaozhen Chen

This paper investigates the degradation properties of Boolean functions from the aspects of the distributions of differences and linear masks, and shows two characterizations of the degraded Boolean function. One is that there exists a linear space of the input differences, where the differentials with the zero output difference have probability 1; Another one is that the input linear masks of ...

2007
Ryan Jones

Computer forensic practitioners must gather, analyse and present evidence at court. A method of data gathering called live forensic acquisition is often used. This method involves gathering data from a system without shutting it down and allows forensic practitioners to access a large quantity of valuable information. However, as data on the computer is constantly changing the copy of data take...

2003
Jorge Nakahara Bart Preneel Joos Vandewalle

This report describes impossible differential (ID) attacks on 3.75round SAFER SK-64, using 2 chosen texts, 2 memory, and 2 time. Moreover, an ID attack on both 2.75-round SAFER+ and on 2.75-round SAFER++ uses 2 data, 2 memory, and 2 time. We used the miss-in-the-middle technique developed by Biham et al. These attacks do not endanger the security of SAFER ciphers, and indicate that ID attacks w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید