نتایج جستجو برای: Contractor

تعداد نتایج: 3390  

2005
Sven Ubik

This document provides description of evaluation tests performed on the SCAMPI architecture. This is the fourth release of D3.4 deliverable. It includes performance tests of the SCAMPI architecture software running on top of 1 GE SCAMPI with monitoring functions implemented in software and firmware. It also includes tests with 10 GE SCAMPI adapter and several application tests. Contractual Date...

2012

During its first year of operation, the SysSec network of excellence has created a roadmap for System Security Research. This white paper presents a summary of this Roadmap along with its expected impact on the European industry, the European Citizen, and Society in general. In addition, this document describes the procedure we propose to maintain the roadmap and update its content at the end o...

2011
Paolo Milani Comparetti

This deliverable presents a survey of research works and data collection initiatives in the areas of malware detection and analysis and online fraud. Contractual Date of Delivery May 2011 Actual Date of Delivery June 2011 Deliverable Dissemination Level Public Editor Paolo Milani Comparetti Contributors TU WIEN EURECOM POLIMI FORTH † The research leading to these results has received funding fr...

Journal: :Artificial Intelligence 2009

Journal: :Journal of the Mass Spectrometry Society of Japan 1963

Journal: :IJSDS 2014
Ahmad Jafarnejad Chaghooshi Ehsan Khanmohammadi Maryam Faghei Amir Karimi

Outsourcing plays an important role in the success of organizations. One of the risks associated with outsourcing is inappropriate contractor selection which significantly influences the implementation of projects in terms of time, quality, and cost. In this study, we applied multi-criteria decision-making techniques in order to determine the best contractor using criteria such as reputation, o...

Journal: :Artif. Intell. 2009
Gilles Chabert Luc Jaulin

This paper describes a solver programming method, called contractor programming, that copes with two issues related to constraint processing over the reals. First, continuous constraints involve an inevitable step of solver design. Existing softwares provide an insufficient answer by restricting users to choose among a list of fixed strategies. Our first contribution is to give more freedom in ...

ژورنال: سلامت کار ایران 2018

Background and aims: In today’s business world, managers use outsourcing strategy as tool to establish competitive advantage and business capabilities in order to subcontract some activities and tasks to qualified contractors. Selecting the fittest contractor from qualified contractors can prevents waste of resource and keeps organizational resource. With regard to complexities, risk...

2012
Hailong Zhu Zhaoxiang Li Kejun Zhuang

By means of Contractor Iteration Method, we solve and visualize the Lane-Emden(-Fowler) equation Δu+ u = 0, in Ω, u = 0, on ∂Ω. It is shown that the present method converges quadratically as Newton’s method and the computation of Contractor Iteration Method is cheaper than the Newton’s method. Keywords—Positive Solutions; Newton’s Method; Contractor Iteration Method; Eigenpairs.

2008
Tom K. Lee

This article studies the role of installment payments in relationships characterized by moral hazard and sunk costs. We rule out vertical integration and payments contingent on the product of the contractor. Instead, each payment is negotiated as and when made. In such circumstances, an initial (down)payment serves to redress the weakness of the contractor in ex post renegotiations. Ifhigher ef...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید