نتایج جستجو برای: clients rights

تعداد نتایج: 190664  

2008
Riccardo Del Gratta Roberto Bartolini Tommaso Caselli Monica Monachini Claudia Soria Nicoletta Calzolari

In this paper we address the issue of developing an interoperable infrastructure for language resources and technologies. In our approach, called UFRA, we extend the Federate Database Architecture System adding typical functionalities coming from UIMA. In this way, we capitalize the advantages of a federated architecture, such as autonomy, heterogeneity and distribution of components, monitored...

2006
Arthur McDonald Haklin Kimm Haesun K. Lee Ilhyun Lee

In this paper, we consider a scheduling algorithm being applied with multi-level security that allows two or more hierarchical classification levels of information to be processed simultaneously. There are various load scheduling algorithms pre-built into the Linux Virtual Server system that have been tested and proven effective for distributing the load among the real servers. While these algo...

Journal: :Oper. Res. Lett. 2016
Sungjin Im Hoon Oh Maryam Shadloo

We consider the maximum flow time minimization problem in batch scheduling, which is a capacitated version of broadcast scheduling. In this setting, n different pages of information are available at the server which receives requests from clients over time for specific pages. The server can transmit atmost one page p at each time to satisfy a batch of requests for the same page p, up to a certa...

Journal: :European Journal of Operational Research 2012
Inmaculada Espejo Alfredo Marín Antonio M. Rodríguez-Chía

The objective of this paper is to identify the most promising sets of closest assignment constraints in the literature of Discrete Location Theory, helping the authors in the field to model their problems when clients must be assigned to the closest plant inside an Integer Programming formulation. In particular, constraints leading to weak Linear Programming relaxations should be avoided if no ...

2004
William Gorman

It is increasingly likely that psychologists may be faced with clients who have been tortured, although the significance of this background can be easily unrecognized or mishandled. With the growing incidence of refugees to the United States escaping from organized violence and human rights violations in many parts of the world, the need for psychological assistance in the recovery from torture...

Journal: :JCM 2015
Xinchun Cui Gang Sheng Fengyin Li Xiaowu Liu

 Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. To be efficient and fair is important to buyer-seller protocols. In this paper, an anonymous and interactive buyer-seller protocol is proposed, which is designed to be impartial and efficient. To solve the unbinding problem and the buyers’ right problem, operations of water...

2000
R. Jones

establishing a dialogue on the merits of the tribunals, and providing an impetus for procedural improvements for tribunal clients. In this study, a primary focus of interest is upon the impact of legal processes on the individuals who use them or who are subject to them. One possibility raised by this is that in some cases, legal procedures that are designed to safeguard an individual’s rights ...

Journal: :Oper. Res. Lett. 2013
Hande Yaman

We study the convex hull of the splittable flow arc set with capacity and minimum load constraints. This set arises as a relaxation of problems where clients have demand for a resource that can be installed in integer amounts and that has capacity limitations and lower bounds on utilization. We prove that the convex hull of this set is the intersection of the convex hull of the set with a capac...

1998
Christian Damsgaard Jensen

Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clients and servers). This code is often particular to the application and the context in which the application is used. Embedding protection definitions in the application code makes it difficult to reuse because differen...

Journal: :Journal of Systems and Software 2002
Kiejin Park Sungsoo Kim

To analyze the performance of multimedia service systems, which have unreliable resources, and to estimate the capacity requirement of the systems, we have developed a capacity planning model using an open queueing network. By acquisition of utilization, queue length of the resources and packet delay, and reliability of the systems, we have derived the service capacity of the systems along with...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید