نتایج جستجو برای: proposed policies
تعداد نتایج: 894066 فیلتر نتایج به سال:
Federal support for child care: Current policies and a proposed new system 1 New publications by Institute authors The changed face of poverty: A call for new policies
this paper considers the problem of scheduling hybrid flowshops with machine availability constraints (mac) to minimize makespan. the paper deals with a specific case of mac caused by preventive maintenance (pm) operations. contrary to previous papers considering fixed or/and conservative policies, we explore a case in which pm activities might be postponed or expedited while necessary. regardi...
We consider the problem of optimizing a polling system, i.e., of optimally sequencing a server in a multi-class queueing system with switch-over times in order to minimize a linear objective function of the waiting times. The problem has important applications in computer, communication, production and transportation networks. We propose nonlinear programming relaxations that provide strong low...
Firewalls are one of the most common mechanisms used to protect the network from unauthorized access and security threats. Nowadays, time-based firewall policies are widely in use in many firewalls such as CISCO ACLs and Linux iptables to control network traffic with respect to time. However, network administrators struggle to maintain the firewall policies due to their high complexity. A confl...
This paper evaluates Australia’s proposed emissions reduction policies in terms of the implied rates of decarbonization of the Australian economy for a range of proposed emissions reduction targets. The paper uses the Kaya Identity to structure the evaluation, employing both a bottom-up approach (based on projections of future Australian population, economic growth, and technology) as well as a...
Provisioning extra resources is necessary when the local resources are not sufficient to meet the user requirements. Commercial Cloud providers offer the extra resources to users in an on demand manner and in exchange of a fee. Therefore, scheduling policies are required that consider resources’ prices as well as user’s available budget and deadline. Such scheduling policies are known as market...
Access control policy management is an increasingly hard problem from both the security point of view and the verification point of view. SELinux is a Linux Security Module (LSM) implementing a mandatory access control mechanism. SELinux integrates user identity, roles, and type security attributes for stating rules in security policies. As SELinux policies are developed and maintained by secur...
This paper provides an improved methodology for analyzing the dynamics of slums in Developing Countries (DC). In particular, it demonstrates how Geographic Information Systems (GIS) and Cellular Automata (CA) can be integrated to model, simulate, predict and dynamically visualize the growth of slums, and thus will improve future planning practices in DC. The paper first examines factors that co...
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
the recent report by barnhill and king about obesity prevention policy raises important issues for discussion and analysis. in response, this article raises four points for further consideration. first, a distinction between equality and justice needs to be made and consistently maintained. second, different theories of justice highlight one additional important source of disagreement about the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید