نتایج جستجو برای: mangement

تعداد نتایج: 154  

Journal: :Japanese Journal of Health Physics 2005

Journal: :Japanese Journal of Health Physics 2003

Journal: :iranian journal of child neurology 0
narjes jafari pediatric neurology division, imam hossein hospital, shahid beheshti university of medical sciences, tehran, iran

how to cite this article: jafari n. management of npc. iran j child neurol. 2015 autumn;9:4(suppl.1): 24.   pls see pdf.

1992
Elisabeth Kupitz

In this paper DECOR, a conngurable integrated design ow mangement component that provides online monitoring and control of concurrent design processes, is described. Manipulations of data objects with arbitrary granularity from les or directories down to single structures can be considered. DECOR is based on extended Predicate Transition Nets as modelling paradigm.

Journal: :The Open Construction and Building Technology Journal 2015

2000
Morsy M. Cheikhrouhou

This paper presents a novel approach to foster network management automation. Our approach is based on the use of intelligent agent technology as a means to provide feedback control of the managed network. The intelligent agents we use are BDI oriented. They are based on beliefs, capabilities, motivations, intentions and goals. Their mental model is first presented, then the way it can be appli...

2002
Thomas Kudrass Matthias Conrad

Many applications deal with complex XML documents that need to be made persistent. We investigate the use of the object-relational modeling approach that combines both the strengths of object oriented concepts and relational DBMS technology provided by current DBMS vendors. As a prerequisite, we analyze the document definition and generate the equivalent object-relational database schema in SQL...

2003
Marco Casassa Mont Pete Bramhall

Identifier-based Encryption (IBE) is an emerging cryptography schema. As it happens for new technologies, there are ongoing debates about its usefulness and best usage. This paper describes some practical applications of IBE, in the areas of confidentiality enforcement, privacy and identity management. These applications include: a service for timed release of confidential information; a secure...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید