نتایج جستجو برای: سیکل مشترک تجدید vmi

تعداد نتایج: 25850  

2011
Craig Hughes Michel Wermelinger Simon Holland

An important challenge in music interaction design is the creation of Virtual Musical instruments (VMIs) that offer expressive, playable, learnable mappings from gesture to sound, and which progressively reward practice by players. This design problem is particularly demanding in the case of non-contact musical instruments where there are limited physical reference points, and no haptic feedbac...

2012
Tamas K. Lengyel Justin Neumann Steve Maresca Bryan D. Payne Aggelos Kiayias

With the recent advent of effective and practical virtual machine introspection tools, we revisit the use of hybrid honeypots as a means to implement automated malware collection and analysis. We introduce VMIHoneymon, a high-interaction honeypot monitor which uses virtual machine memory introspection on Xen. VMI-Honeymon remains transparent to the monitored virtual machine and bypasses relianc...

2016
Andrew Potter Denis Towill Stephen M. Disney

Despite the importance of transport within the supply chain, it has traditionally been treated as a separate function within businesses. More recently there has been increased recognition that transport needs to be integrated into the supply chain. This chapter considers vendor managed inventory, and demonstrates how it can be used to improve both transport and supply chain performance. With VM...

Journal: :Expert Syst. Appl. 2011
Shu-Hsien Liao Chia-Lin Hsieh Peng-Jen Lai

Vendor-managed inventory (VMI) is one of the emerging solutions for improving the supply chain efficiency. It gives the supplier the responsibility to monitor and decide the inventory replenishments of their customers. In this paper, an integrated location–inventory distribution network problem which integrates the effects of facility location, distribution, and inventory issues is formulated u...

2014
Salman Javaid Vassil Roussev Irfan Ahmed

Malware detection and analysis is a major part of computer security. There is an arm race between security experts and malware developers to develop various techniques to secure computer systems and to nd ways to circumvent these security methods. In recent years process heap-based attacks have increased signi cantly. These attacks exploit the system under attack via the heap, typically by usin...

Journal: :Electronics 2023

Copious evidence shows that impaired visual–motor integration (VMI) is intrinsically linked to the core deficits of autism spectrum disorder (ASD) and associated with an anomalous social capability. Therefore, effective evaluation method behaviour can provide meaningful insight into VMI towards The current pilot study aims explore appropriate quantified metrics for evaluating ability based on a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه محقق اردبیلی - دانشکده فنی 1393

با توجه به محدود بودن منابع انرژی هسته ای و فسیلی و همین طور مشکل آلودگی محیط زیست نیاز به جایگزینی مناسب برای این سوخت ها به شدت احساس می شود. دراین بین استفاده از انرژی های پاک و تجدید پذیر به دلیل بی پایان بودن منابع وهمین طور عدم آلودگی محیط زیست پیوسته رو به افزایش است به طوری که امروزه شاهد افزایش چشمگیر فعالیت ها وسرمایه گذاری های دولت ها و شرکت های بخش خصوصی در امر تحقیق، توسعه و عرضه ا...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :Discrete Dynamics in Nature and Society 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید