نتایج جستجو برای: operating policy
تعداد نتایج: 412364 فیلتر نتایج به سال:
We present a new method of determining an operating policy for a multi-reservoir system in which the operating policy for a reservoir is determined by solving a stochastic dynamic programming model consisting of that reservoir and a 2-dimensional representation of the rest of the system. The method is practical for systems with many reservoirs because the time required to determine an operating...
This paper proposes a new approach to operating system support for fault tolerance. We argue that in order to meet diverse application fault-tolerance requirements, the operating system should allow users to extend its functionality to support application-specific fault-tolerance protocols. We show that this kind of customisability can be achieved by explicitly decomposing the operating system ...
Distribution is a key property for future Integral Object-Oriented Systems (IOOS) based solely on the Object-Oriented paradigm. The introduction of object distribution in the IOOS is not trivial if we want a clear distinction between mechanisms and policies and even more if we want policies to be easily replaced or customized. We have found that reflection is a wellsuited technology for endowin...
The application-defined scheduling model allows the implementation and use of different scheduling policies in a way compatible with the scheduling model defined in POSIX. The new scheduling policies are integrated into a real-time operating system without modifying its internal structure. In this paper, we discuss the application-defined scheduling model and propose some extensions to it. Part...
the formulation of global health policy is political; and all institutions operating in the global health landscape are political. this is because policies and institutions inevitably represent certain values, reflect particular ideologies, and preferentially serve some interests over others. this may be expressed explicitly and consciously; or implicitly and unconsciously. but it’s important t...
This paper discusses the enhancement of security in general purpose operating systems, especially related to threats caused by internetworking, using extensions to operating systems. Such mechanisms have a significantly larger basis for reaching security policy decisions than older host-level security mechanisms and firewalls. By layering defensive mechanisms yet enforcing a consistent security...
Commodity merchants use real option models to manage their operations. A central element of such a model is its underlying operating policy. We focus on network contracts for the transport capacity of natural gas pipelines, specific energy conversion assets. Practitioners commonly manage these contracts as portfolios of spread options. Although computationally fast, we show that this approach i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید