نتایج جستجو برای: operating policy

تعداد نتایج: 412364  

1990
Phil Winterbottom

Topsy is a new message passing multicomputer architecture. It comprises a fully Unix compatible distributed kernel, called Meshix resting on a message based software system which in turn relies on new, high speed, communications hardware. A brief overview of the machine architecture and operating system is presented. We then discuss the implementation of the distributed le servers and their imp...

1995
Margo Seltzer

Many of the performance improvements cited in recent operating systems research describe specific enhancements to normal operating system functionality that improve performance in a set of designated test cases. Global changes of this sort can improve performance for one application, at the cost of decreasing performance for others. We argue that this flurry of global kernel tweaking is an indi...

2011
Amanda Crowell

Modern operating systems each have different implementations of access controls and use different policies for determining the access that subjects may have on objects. This paper reviews the three main types of access control policies: discretionary, mandatory, and role-based. It then describes how Windows and various Unix systems implement their chosen access control policies. Finally, it dis...

Journal: :AANA journal 2001
F Dexter E Thompson

Many anesthesia groups provide services in a spectrum of anesthetizing locations, including offices, free-standing ambulatory surgery centers, diagnostic clinics, and traditional hospital operating rooms. The use of a uniformly understood measure of case complexity could assist an anesthesia group in ensuring appropriate anesthesia provider expertise and equipment availability at each anestheti...

Journal: :Finance and Stochastics 2011
Frank Riedel Xia Su

This paper develops a general theory of sequential irreversible investments in capital where a firm has the option to expand its current capacity or just wait for better time. Facing economic uncertainty, the firm has an operating function of the current capacity and an exogenous stochastic factor modelled by semimartingale. This general model encompasses all previously studied models, includin...

Journal: :Journal of health politics, policy and law 1990
P A Paul-Shaheen

Increased public demand for health services, combined with fiscal and operating restraints, has led to the need for programs that will operate efficiently and effectively to achieve their objectives. Establishing such programs requires an understanding of the factors that contribute to their development and implementation. This in turn requires a greater understanding of the policy formulation ...

2015
GUONAN MA

• There are three main reasons for this policy shift. First, there is evidence that the Chinese economy has been operating below its potential capacity. Second, among the big five economies, China’s monetary policy stance and broader financial condition both tightened the most in the wake of the global financial crisis, likely weighing on domestic growth. Third, a mix of easy monetary policy an...

2011
Michelle Gilmartin David Learmonth Peter McGregor Kim Swales Karen Turner

UK regional policy has been advocated as a means of reducing regional disparities and stimulating national growth. However, there is limited understanding of the interregional and national effects of such a policy. This paper uses an interregional computable general equilibrium model to identify the national impact of a policy-induced regional demand shock under alternative labour market closur...

2018
Diana Cristina González Albrecht Wolf Luciano Leonel Mendes José Cândido Silveira Santos Michel Daoud Yacoub Gerhard Fettweis

Recently, a simple and efficient policy was proposed to allocate power among an arbitrary number of lossyforward relays operating over Rayleigh fading channels. It is arguable, however, that a policy used in one fading scenario will equally perform in another. Motivated by this, we design a new power allocation policy that extends the referred one to operate in an arbitrary fading scenario. The...

2012
Ali Ahmadian Ramaki Reza Ebrahimi Atani

Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید