نتایج جستجو برای: operating policy

تعداد نتایج: 412364  

1993
Muthusamy Chelliah Mustaque Ahamad

Extended and replicated transaction models provide consistency and forward progress guarantees for distributed applications that manipulate persistent, shared data. In our earlier work, we developed OS mechanisms that can implement the various transaction models as policies at the user level. The mechanisms facilitate eeciency and exibility, but programming using the primitive OS mechanisms cou...

1999
Julita Corbalán Xavier Martorell Jesus Labarta

In an multiprocessor environment, with applications running concurrently, the Operating System is responsible for optimizing the system utilization. The scheduler distributes processors among applications according to a scheduling policy. The system utilization depends on several factors such as the number of processors assigned to an application, the placement of these processors or the amount...

Journal: :iranian journal of public health 0
s asefzadeh ar raeisi a mousavi

background: the aim of this study was assessment the risk management status of waste anesthetic gases in academicals hospitals in iran to prevent from harmful effects of these gases on employees' health. methods: a descriptive-analytic study was designed in 2011. standard structured checklist developed by ecri institute (emergency care research institute) was applied. checklists were filled ons...

1994
Christopher Small Margo Seltzer

In 1981, Stonebraker wrote: Operating system services in many existing systems are either too slow or inappropriate. Current DBMSs usually provide their own and make little or no use of those o ered by the operating system. [STON81] The standard operating system model has changed little since that time, and we believe that, at its core, it is the wrong model for DBMS and other resource-intensiv...

Journal: :European Journal of Operational Research 2012
Fehmi Tanrisever Douglas Morrice David Morton

Managing Capacity Flexibility in Make-to-Order Production Environments Fehmi Tanrisever , Douglas Morrice , David Morton c a School of Industrial Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands b Red McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 c Graduate Program in Operations Research and Industrial Engineering, The University of T...

2008
Matthias Schwan

Security systems that use smart cards are nowadays an important part of our daily life, which becomes increasingly dependent on the reliability of such systems, for example cash cards, electronic health cards or identification documents. Since a security policy states both the main security objectives and the security functions of a certain security system, it is the basis for the reliable syst...

Journal: :thrita 0
yosra azizpour student research committee, ilam university of medical sciences, ilam, ir iran masoumeh shohani student research committee, tabriz university of medical sciences, tabriz, ir iran; paramedical school, ilam university of medical sciences, ilam, ir iran; student research committee, tabriz university of medical sciences, tabriz, ir iran; paramedical school, ilam university of medical sciences, pazhouhesh street, ilam, ir iran. tel: +98-9188426498, fax: +98-8412227134 kourosh sayehmiri department of biostatistics, research centre for prevention of psychosocial trauma, ilam university of medical sciences, ilam, ir iran sattar kikhavani department of clinical psychology, ilam university of medical sciences, ilam, ir iran

results higher levels of stress were due to the fear of being infected by hiv and hepatitis patients with mean of 3.2 and 58%; and lack of weekends with mean of 3 and 44%. the lowest levels of stress were related to inadequate skills with mean of 2.18 and 32%, and environment light with mean of 2.14 and 34.7%. stress was significantly related to job status, conflict of doctors and nurses as wel...

2017
Drew Davidson Vaibhav Rastogi Mihai Christodorescu Somesh Jha

The Android operating system provides a rich security model that specifies over 100 distinct permissions. Before performing a sensitive operation, an app must obtain the corresponding permission through a request to the user. Unfortunately, an app is treated as an opaque, monolithic security principal, which is granted or denied permission as a whole. This blunts the effectiveness of the permis...

2012
Riad Akrour Marc Schoenauer Michèle Sebag

This work tackles in-situ robotics: the goal is to learn a policy while the robot operates in the real-world, with neither ground truth nor rewards. The proposed approach is based on preference-based policy learning: Iteratively, the robot demonstrates a few policies, is informed of the expert’s preferences about the demonstrated policies, constructs a utility function compatible with all exper...

1992
Winfried Kalfa

Until now, the management of resources was a task of the operating systems kernel. The applications running on the operating system were in general, similiar to each other. Thus the limited policy of the resource manager could satisfy the demands of applications. With the advent of computer systems capable handling new applications such as multi-media and of new operating systems based on micro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید