نتایج جستجو برای: users violations

تعداد نتایج: 222582  

2007
Sylvain Boulmé Marie-Laure Potet

In the B method, the invariant of a component cannot be violated outside its own operations. This approach has a great advantage: the users of a component can assume its invariant without having to prove it. But, B users must deal with important architecture restrictions that ensure the soundness of reasonings involving invariants. Moreover, understanding how these restrictions ensure soundness...

2010
Simone Basso Antonio Servetti Juan Carlos De Martin

The “Network Neutrality Bot” (Neubot) is a software application that measures, in a distributed way, Internet access quality of service with a specific emphasis on detection of potential network neutrality violations (such as peer-to-peer traffic discrimination). It is based on a lightweight, open-source computer program that can be downloaded and installed by ordinary Internet users. The progr...

Journal: :Perception & Psychophysics 1970

2016
Malte Skambath Till Tantau

While the algorithmic drawing of static trees is well-understood and well-supported by software tools, creating animations depicting how a tree changes over time is currently difficult: software support, if available at all, is not integrated into a document production workflow and algorithmic approaches only rarely take temporal information into consideration. During the production of a presen...

Journal: :Modern Physics Letters A 2013

2013
Giovanni Sartor

User-generated information is processed on providers’ platforms in a way resulting from the intersection of two choices: users’ choices on what to distribute, on what platforms, and with what options, and providers’ choices on how to shape their platforms, enabling what kinds of distribution, with what options to offer to their users. In the following I shall consider whether the latter choices...

Journal: :Journal of clinical child and adolescent psychology : the official journal for the Society of Clinical Child and Adolescent Psychology, American Psychological Association, Division 53 2009
Maartje Timmermans Pol A C van Lier Hans M Koot

Adolescent delinquency and academic underachievement are both linked with child and adolescent behavior problems. However, little is known about behavioral pathways leading to these adverse outcomes. Children's aggression, opposition, status violations, and property violations scores were collected at ages 5, 10, and 18. Delinquency and academic functioning was rated at age 18. Age 18 status vi...

2016
Amanpreet Kaur Bikrampal Kaur Dheerendra Singh

Cloud computing is an emerging technology which provides unlimited access of versatile resources to users. The multifaceted and dynamic aspects of cloud computing require efficient and optimized techniques for resource provisioning and load balancing. Cloud monitoring is required identifying overutilized and underutilized of physical machines which hosting Virtual Machines (VMs). Load balancing...

2013
Gregor Richards Christian Hammer Francesco Zappa Nardelli Suresh Jagannathan Jan Vitek

Providing security guarantees for systems built out of untrusted components requires the ability to define and enforce access control policies over untrusted code. In Web 2.0 applications, JavaScript code from different origins is often combined on a single page, leading to well-known vulnerabilities. We present a security infrastructure which allows users and content providers to specify acces...

2010
Georg Birkenheuer André Brinkmann Holger Karl

The commercial exploitation of the emerging Grid and Cloud markets needs SLAs to sell computing run times. Job traces show that users have a limited ability to estimate the resource needs of their applications. This offers the possibility to apply overbooking to negotiation, but overbooking increases the risk of SLA violations. This work presents an overbooking approach with an integrated risk ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید