نتایج جستجو برای: schedule analysis
تعداد نتایج: 2857212 فیلتر نتایج به سال:
in this paper, a multi-period and multi-resource operating room (or) scheduling and rescheduling problem with elective and semi-elective (semi-urgent) patients is addressed. a scheduling-rescheduling framework based on the so-called rolling horizon approach is proposed to solve the problem. the core of the proposed framework is a novel proposed mixed-integer linear programming (milp) model with...
BACKGROUND The standard sunitinib schedule, 4 weeks on, followed by 2 weeks off (4/2 schedule), is associated with troublesome toxicities, and maintenance of adequate sunitinib dosing and drug levels, which are essential for achieving an optimal treatment outcome, is challenging. The objective of this study was to investigate the efficacy and safety of an alternative sunitinib dosing schedule o...
Dalvik virtual machine’s performance determines the performance of the Android platform. And each Dalvik virtual machine process is a Linux process, and each Dalvik virtual machine thread is a Linux thread. This paper analyses and researches process model of Android Dalvik virtual machine. Through research and analysis the role of Zygote in startup process of Dalvik virtual machine and the Zygo...
Foreword EWAS.06, the third European Workshop on Aspects in Software, follows the tradition of its two predecessor workshop series organized independently by the German " Gesellschaft für Informatik " , Belgian and Dutch research groups. It focuses on providing AOSD researchers and practitioners with an interactive forum for fostering novel ideas and turning submitted material into conference-r...
This letter proposes a differential fault analysis on the AES key schedule and shows how an entire 128-bit AES key can be retrieved. In the workshop at FDTC 2007, we presented the DFA mechanism on the AES key schedule and proposed general attack rules. Using our proposed rules, we showed an efficient attack that can retrieve 80 bits of the 128-bit key. Recently, we have found a new attack that ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید