نتایج جستجو برای: government protocol
تعداد نتایج: 377577 فیلتر نتایج به سال:
BACKGROUND The Deepwater Horizon (DH) blowout resulted in fisheries closings across the Gulf of Mexico. Federal agencies, in collaboration with impacted Gulf states, developed a protocol to determine when it is safe to reopen fisheries based on sensory and chemical analyses of seafood. All federal waters have been reopened, yet concerns have been raised regarding the robustness of the protocol ...
In group communications, we find that current multicast protocols are far from “one size fits all”: they are typically geared towards and optimized for particular scenarios. As a result, when deployed in different scenarios, their performance and overhead often degrades significantly. A common problem is that most of these protocols incur high overheads with a high density of group members and ...
The findings, interpretations, and conclusions expressed here are those of the author(s) and do not necessarily reflect the views of the Board of Executive Directors of the World Bank or the governments they represent. The World Bank cannot guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not ...
This paper contributes to the issue of mGovernment implementations by exploring the government’s policy on ICT and e-Government in Saudi Arabia, and sheds light on the role of mGovernment applications for enhancing information and service delivery to citizens. This also describes the results of a survey on the available mGovernment applications, and provides an overall evaluation of them in Sau...
Electronic Government (e-government) is a rapidly growing field that gets increasing attention from practitioners and researchers around the world. This attention comes from various disciplines, including public administration, information systems, computer science, political science and organisation research. Over the last decade the field has been maturing, with its own research programs, ded...
This paper is concerned with the use of patterns to support the development of software for reliable, resource-constrained, embedded systems. The specific focus is on systems with a time-triggered architecture in which task pre-emption can occur. The paper introduces one new abstract pattern (CRITICAL SECTION), and four new design patterns (DISABLE TIMER INTERRUPT, RESOURCE LOCK, PRIORITY INHER...
We propose a framework called \World Trade League," which is expected to become a standard problem in multi-agent economics. The rst purpose of World Trade League is to propose a network game in the context of economic and social systems. Such a game in World Trade League is executed by several players (countries), where each of country consists of heterogeneous agents such as product makers, s...
The infrastructure networks of greatest importance to national security and stability include telecommunications, electrical power systems, gas and oil, banking and finance, transportation, water supply systems, government and emergency services. After the September 11, 2001 WTC attack, more sensors and surveillance systems are being deployed to monitor these critical infrastructures. While the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید