نتایج جستجو برای: safe structures
تعداد نتایج: 576259 فیلتر نتایج به سال:
E-business, information serving, and ubiquitous computing will create heavy request traffic from strangers or even incognitos. Such requests must be managed automatically. Two ways of doing this are well known: giving every incognito consumer the same treatment, and rendering service in return for money. However, different behavior will be often wanted, e.g., for a university library with diffe...
Safe is a first-order eager language with facilities for programmer-controlled destruction and copying of data structures. It provides also regions, i.e. disjoint parts of the heap where the programmer may allocate data structures. A type system is used to avoid dangling pointers arising from the inadequate usage of these facilities. In this paper we present an inference algorithm, we describe ...
Recently in epistemology a number of authors have mounted Bayesian objections to dogmatism. These objections depend on a Bayesian principle of evidential confirmation: Evidence E confirms hypothesis H just in case Pr(H|E)>Pr(H). I argue using Keynes’ and Knight’s distinction between risk and uncertainty that the Bayesian principle fails to accommodate the intuitive notion of having no reason to...
This paper presents one of the first fully functional FlexRay transceivers manufactured in a 0.35 μm CMOS High-Voltage technology, which provides high voltage MOS devices together with standard 3.3 V gates. The circuit operates as interface between a generic controller and the copper wire FlexRay physical bus, to be used in fault tolerant and fail safe applications. In particular, the transceiv...
In my Wish List, an Automated Tool for Fail-Secure Design Analysis: an Alloy-Based Feasibility Draft
A system is said to be fail-secure, sometimes confused with fail-safe, if it maintains its security requirements even in the event of some faults. Fail-secure analyses are required by some validation schemes, such as some Common Criteria or NATO certifications. However, it is an aspect of security which as been overlooked by the community. This paper attempts to shed some light on the failsecur...
The No Child Left Behind Act of 2001 (NCLB) requires that schools make “adequate yearly progress” (AYP) towards the goal of having 100 percent of their students become proficient by year 2013-14. Through simulation analyses of Maine and Kentucky school performance data collected during the 1990s, this study investigates how feasible schools would have met the AYP targets if the mandate had been...
In the absence of pedestrian crossing lights, finding a safe moment to cross the road is often hazardous and challenging, especially for people with visual impairments. We present a reliable low-cost solution, an Android device attached to a traffic sign or lighting pole near the crossing, indicating whether it is safe to cross the road. The indication can be by sound, display, vibration, and v...
An i~J!Jas designed to assess the reference outcome in terms of patron report of success. It was theorized that patrons were capable of separating reports of success in finding what was wanted from reports of general overall satisfaction, if given a suitably constructed instrument. Utilized in design were Cronbach 's theories on response set and Cuadra's theories on the fail-safe reaction. A su...
Context: How to adopt, scale and tailor agile methods depends on several factors such as the size of the organization, business goals, operative model, and needs. The Scaled Agile Framework (SAFe ©) was developed to support organizations to scale agile practices across the enterprise. Problem: Early adopters of SAFe © tend to be large multi-national enterprises who report that the adoption of S...
Why Don’t Multi-Agency Child Welfare Initiatives Deliver? A Counterpoint to Best Practice Literature
A common problem that has been identified through my office’s work in the child protection area has been a failure of agencies to deliver a coordinated response with a positive outcome to vulnerable families. Significant resources and efforts have been devoted to establishing Keep Them Safe as a system of shared responsibility between government agencies and non-government agencies. As I have p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید