نتایج جستجو برای: operating policy
تعداد نتایج: 412364 فیلتر نتایج به سال:
Implementing transformational change towards the Net-Centric Operations (NCO) vision in support of enhanced command and control presents technical, operational, and cultural challenges. The technical challenges are being addressed by both industry and the Department of Defense pushing the state of the art further ahead. However, in many cases the technology transformation is too far ahead of th...
We deene the notion of the application-oriented security policy and suggest that it diiers from that of a system-level, global security policy. We view a policy as a conjunction of security properties and argue that these properties are not always independent and, hence, cannot be analyzed (e.g., composed) individually. We also argue that some necessary policy properties fall outside of the Alp...
foreign policy takes root from complicated matters. however, this issue may be more truth about armenia. although the new government of armenia is less than 20 years, people of this territory are the first ones who officially accepted christianity. in very past times, these people were a part of great emperors like iran, rome, and byzantium.armenia is regarded as a nation with a privileged hist...
Transport systems integrate operating system services such as memory and process management together with communication protocols that utilize these OS services to support distributed applications running on local and wide area networks. Existing transport systems do not customize their services to meet the quality-of-service requirements of distributed applications. This often forces developer...
Multicore architectures are employed more and more in todays system. A main task of current operating systems is to equalize the load of each CPU’s core, it is accomplished by the migration policy of an operating system. Nevertheless, the migration policy of an operating system is mostly entangled in the kernel. Thus, migration policies of guest kernels running within virtual machines may contr...
Coordinated control schemes, at fossil fuel power plants, drive units as a whole through a variable pressure operating policy. Ordinarily, the pressure control loop set-point is obtained from the unit load demand through a fixed nonlinear mapping that does not allow for process optimization under operating conditions different from the originals. This paper presents a procedure to optimally des...
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (MAC) is needed to address such requirements, but the limitations of traditional MAC have inhibited its adoption into mainstream operating systems. The National Security Agency (NSA) worked with Secure Computing Corporat...
Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operating system, such protection mechanisms may be ineffective. Since security-sensitive applications are most motivated to maintain access control to their secret or sensitive information, and have no control over the operating syste...
To meet tightening security requirements, modern operating systems enforce mandatory access control based on formal security policies. To ensure the critical property of policy correctness, formal methods and models for both their specification and verification are used. The variety of these approaches reflects the diversity and heterogeneity of policy semantics, which makes policy engineering ...
This study captures regime-switching, monetary policy responses to financial market disturbances in Canada. Monetary policy is identified within a nonlinear, structural VAR framework with a regime-switching policy block that allows for contemporaneous policy reactions in a small open economy. The key finding is that monetary policy in Canada has undergone important changes in monetary policy re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید