نتایج جستجو برای: operating policy
تعداد نتایج: 412364 فیلتر نتایج به سال:
A growing class of sensor network applications require high data rates and computationally-intensive node-level processing. When deployed into environments where resources are limited and variable, achieving good performance requires applications to adjust their behavior as resource availability changes. This paper presents Pixie, a new sensor network operating system designed to facilitate the...
To exploit the high performance afforded by the hardware, applications must be allowed to customize the operating system according to their needs. A pertinent question is: What interface should the operating system kernel provide to the user-level code? This interface should be efficient, extensible, and safe, but need not provide high-level abstractions. Abstractions and policies are better le...
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of countermeasures for the identified threats is described along with the integration of countermeasures into a policy-based security infrastructure; finally, an implementation of the countermeasure in the form of a policy en...
Spend your time even for only few minutes to read a book. Reading a book will never reduce and waste your time to be useless. Reading, for some people become a need that is to do every day such as spending time for eating. Now, what about you? Do you like to read a book? Now, we will show you a new book enPDFd operating systems concepts policies and mechanisms that can be a new way to explore t...
Inflation targeting is a statement about the objective of central bank policy and not about operating procedures. Its success depends not only on the actions of the central bank, but requires a broad consensus concerning the proper role of monetary policy in the economy. It also requires the backing of a sound fiscal policy. As countries differ both in economic structure and monetary transmissi...
In this paper we analyse the operating room planning at a department of orthopaedic surgery in Sweden. We focus on the problem of meeting the uncertainty in demand of patient arrival and surgery duration and at the same time maximizing the utilization of operating room (OR) time. With a discrete-event model we simulate how different management polices affect different performance metrics such a...
The e ectiveness of an access control mechanism in implementing a security policy in a centralised operating system is often weakened because of the large number of possible access rights involved, informal speci cation of security policy and a lack of tools for assisting systems administrators. Herein we present a logical foundation for automated tools that assist in determining which access r...
This paper describes how the composition principle of Abadi and Lamport can be applied to specify and compose systems where access control policies are distributed among a hierarchy of agents. Examples of such systems are layered secure operating systems, where the mandatory access control policy is enforced by the lowest system layer and discretionary and application-speciic policies are imple...
Chemical and refinery process operations have to deal with an increasingly transient and competitive marketplace. The traditional strategy of operating a plant in isolation from its environment within and outside the supply chain with exogenous influences interpreted as disturbances is not any more appropriate. Rather, manufacturing must quickly adapt to the transient environment to exploit eco...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید