نتایج جستجو برای: operating policy
تعداد نتایج: 412364 فیلتر نتایج به سال:
Extended and replicated transaction models provide consistency and forward progress guarantees for distributed applications that manipulate persistent, shared data. In our earlier work, we developed OS mechanisms that can implement the various transaction models as policies at the user level. The mechanisms facilitate eeciency and exibility, but programming using the primitive OS mechanisms cou...
In an multiprocessor environment, with applications running concurrently, the Operating System is responsible for optimizing the system utilization. The scheduler distributes processors among applications according to a scheduling policy. The system utilization depends on several factors such as the number of processors assigned to an application, the placement of these processors or the amount...
background: the aim of this study was assessment the risk management status of waste anesthetic gases in academicals hospitals in iran to prevent from harmful effects of these gases on employees' health. methods: a descriptive-analytic study was designed in 2011. standard structured checklist developed by ecri institute (emergency care research institute) was applied. checklists were filled ons...
In 1981, Stonebraker wrote: Operating system services in many existing systems are either too slow or inappropriate. Current DBMSs usually provide their own and make little or no use of those o ered by the operating system. [STON81] The standard operating system model has changed little since that time, and we believe that, at its core, it is the wrong model for DBMS and other resource-intensiv...
Managing Capacity Flexibility in Make-to-Order Production Environments Fehmi Tanrisever , Douglas Morrice , David Morton c a School of Industrial Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands b Red McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 c Graduate Program in Operations Research and Industrial Engineering, The University of T...
Security systems that use smart cards are nowadays an important part of our daily life, which becomes increasingly dependent on the reliability of such systems, for example cash cards, electronic health cards or identification documents. Since a security policy states both the main security objectives and the security functions of a certain security system, it is the basis for the reliable syst...
results higher levels of stress were due to the fear of being infected by hiv and hepatitis patients with mean of 3.2 and 58%; and lack of weekends with mean of 3 and 44%. the lowest levels of stress were related to inadequate skills with mean of 2.18 and 32%, and environment light with mean of 2.14 and 34.7%. stress was significantly related to job status, conflict of doctors and nurses as wel...
The Android operating system provides a rich security model that specifies over 100 distinct permissions. Before performing a sensitive operation, an app must obtain the corresponding permission through a request to the user. Unfortunately, an app is treated as an opaque, monolithic security principal, which is granted or denied permission as a whole. This blunts the effectiveness of the permis...
This work tackles in-situ robotics: the goal is to learn a policy while the robot operates in the real-world, with neither ground truth nor rewards. The proposed approach is based on preference-based policy learning: Iteratively, the robot demonstrates a few policies, is informed of the expert’s preferences about the demonstrated policies, constructs a utility function compatible with all exper...
Until now, the management of resources was a task of the operating systems kernel. The applications running on the operating system were in general, similiar to each other. Thus the limited policy of the resource manager could satisfy the demands of applications. With the advent of computer systems capable handling new applications such as multi-media and of new operating systems based on micro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید