نتایج جستجو برای: operating environment
تعداد نتایج: 657694 فیلتر نتایج به سال:
programming and operating environment J. E. Moreira G. Almási C. Archer R. Bellofatto P. Bergner J. R. Brunheroto M. Brutman J. G. Castaños P. G. Crumley M. Gupta T. Inglett D. Lieber D. Limpert P. McCarthy M. Megerian M. Mendell M. Mundy D. Reed R. K. Sahoo A. Sanomiya R. Shok B. Smith G. G. Stewart With up to 65,536 compute nodes and a peak performance of more than 360 teraflops, the Blue Gen...
The cost of maintenance of mechanized and automated mining systems is too high necessitating efforts to enhance the effectiveness of maintenance systems and organization. For effective maintenance planning, it is important to have a good understanding of the reliability and availability characteristics of the systems. This is essential for determining the Mean Residual Life (MRL) of systems so ...
Managing the partitioning of resources between uncooperating applications is a fundamental requirement of an operating environment. Traditional operating environments only manage low-level resources which presents an impedance mismatch for internet-facing applications with service levels defined in terms of application-level transactions. The Multi-tasking Virtual Machine (MVM) and associated R...
Background and Aim: The operating room is one of the main units in a hospital, where the most important phase of treatment is performed. Due to the physical properties, use of gases, and different electric devices in the operating room, the safety of both the patients and the staff should be considered carefully. This study aims to estimate the safety standards of the operating rooms in Tehran...
It is a pleasure to be able to address this year’s Retail Financial Services Forum. As you know, this is the sixth year that the Forum has been held and I think it is fair to say that the current environment is more challenging than at any time over that six-year period. The global fi nancial system is having to deal simultaneously with a very large repricing of risk, an unwinding of the levera...
Multimedia applications place new demands upon processors, networks and operating systems. While some network designers, through ATM for example, have considered revolutionary approaches to supporting multimedia, the same cannot be said for operating systems designers. Most work is evolutionary in nature, attempting to identify additional features that can be added to existing systems to suppor...
There are several types of attacks, including multi-protocol attacks, that occur when incorrect assumptions are made about the operating environment of a cryptographic protocol. This paper introduces the concept of a protocol service layer providing separation between cryptographic services and their uses. This layer implements the necessary security functions needed to implement the secure env...
According to the improvements in wireless Internet technology, multimedia applications create new challenges, which must be solved. Internetbased videoconferencing systems have many variable factors, such as changes in the system operating environment or operating status of the hardware, according to the operator using the system. In this paper, we propose the Videoconferencing System, with mul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید