نتایج جستجو برای: guest system
تعداد نتایج: 2243049 فیلتر نتایج به سال:
Increasing occupancy rates and revenue by improving customer experience is the aim of modern hospitality organizations. To achieve these results, hotel managers need to have a deep knowledge of customers’ needs, behavior, and preferences and be aware of the ways in which the services delivered create value for the customers and then stimulate their retention and loyalty. In this article a metho...
A known host-guest assembly, organized only by means of relatively weak dispersive forces, exhibits hitherto unappreciated thermal stability. The hexagonal close-packed arrangement of calix[4]arene contains lattice voids that can occlude small, highly volatile molecules. This host-guest system can be exploited to retain a range of freons, as well as methane, not only well above their normal boi...
Cloud computing does not inherently require the use of virtual machines, and some cloud customers prefer or even require “bare metal” systems, where no hypervisor separates the guest operating system from the CPU. Even for bare-metal nodes, the cloud provider must find a means to isolate the guest system from other cloud resources, and to manage the instantiation and removal of guests. We argue...
Nowadays “greenwashing” is a popular term. We are aware of companies such as BP Oil and many others being accused of greenwashing, claiming eco-consciousness or launching products and services that are less than legitimately green. But few people know that the term was originally coined to criticize hotels that encouraged guests to reuse towels for environmental reasons but made little or no ef...
Guest exchange in an M4L6 supramolecular host has been evaluated to determine whether host rupture is required for guest ingress and egress. Two mechanistic models were evaluated: one requiring partial dissociation of the host structure to create a portal for guest passage and one necessitating deformation of the host structure to create a dilated aperture for guest passage without host rupture...
Stealth rootkits that hide themselves on victim systems pose a major threat to computer systems. They are usually evasive as they use sophisticated stealth techniques to conceal files, processes, kernel modules, and other types of objects, making it extremely challenging to detect their presence in the victim system. However, current detection techniques are mostly system-specific and ineffecti...
Title of dissertation: EXPLOITING IDLE CYCLES IN NETWORS OF WORKSTATIONS Kyung Dong Ryu, Doctor of Philosophy, 2001 Dissertation directed by: Associate Professor Jeffrey K. Hollingsworth Department of Computer Science Studies have shown that workstations are idle a significant fraction of the time. Traditional idle resource harvesting systems define a social contract that permits guest jobs to ...
Emissive layers in phosphorescent organic light-emitting diodes commonly make use of guest–host blends such as Ir(ppy)3:CBP to achieve high external quantum efficiencies. However, while the blend has been studied experimentally, crucial questions remain regarding how exciton diffusion is dependent on distribution guest host, which can currently only be addressed at atomic level via computationa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید