نتایج جستجو برای: unavailability period
تعداد نتایج: 493232 فیلتر نتایج به سال:
The Dimension Action (DA) model asserts that the visual system is modular, and that each task involves multiple-response mechanisms rather than a unitary-response selection mechanism. The model has been supported by evidence from single-task interference paradigms. We use the psychological refractory period paradigm and show that dual-task performance can also be explained by the DA model. In 6...
In a seminal STOC’95 paper, Arya et al. conjectured that spanners for low-dimensional Euclidean spaces with constant maximum degree, hop-diameter O(logn) and lightness O(logn) (i.e., weight O(logn)· w(MST)) can be constructed in O(n logn) time. This conjecture, which became a central open question in this area, was resolved in the affirmative by Elkin and Solomon in STOC’13 (even for doubling m...
It has recently been demonstrated that a lateralized distractor that matches the individual's top-down control settings elicits an N2pc wave, an electrophysiological index of the focus of visual-spatial attention, indicating that contingent capture has a visual-spatial locus. Here, we investigated whether contingent capture required capacity-limited central resources by incorporating a continge...
It is widely acknowledged that visual input is processed along two anatomically and functionally distinct pathways--a ventral pathway for conscious perception and a dorsal pathway for action control. The present study investigated whether the apparent direct and unmediated processing in the dorsal stream is subject to capacity limitations. Specifically, we tested whether a simple dorsal task of...
In this chapter we present recent contributions in the field of sequential job scheduling on network machines which work in parallel; these are subject to temporary unavailability. This unavailability can be either unforeseeable (online models) or known a priori (offline models). For the online models we are mainly interested in preemptive schedules for problem formulations where the machine un...
This paper surveys existing enterprise technologies that control access to confidential digital data, and analyzes the impact of system and staff unavailability on the obtained security. The researched technologies allow restrictions to be placed on copying, editing, viewing and printing from within various software applications, provide auditing options and prevent outsider access through encr...
Cloud storage multi-homing (a.k.a. as multicloud) represents a possible solution to achieve enhanced availability of one’s own data and build an extremely reliable cloud environment out of relatively unreliable single cloud platforms. However, subscribing with multiple cloud providers comes at a cost. The cost of multiple subscriptions must be compared against the damage resulting from the poss...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید