نتایج جستجو برای: share

تعداد نتایج: 109058  

Journal: :The Journal of The Institute of Image Information and Television Engineers 2017

Journal: :Journal of Radiology Nursing 2021

Journal: :Journal of Systems and Software 2005
Anand Srinivasan James H. Anderson

In dynamic real-time task systems, tasks that are subject to deadlines are al-lowed to join and leave the system. In previous work, Stoica et al. and Baruah et al.presented conditions under which such joins and leaves may occur in fair-scheduleduniprocessor systems without causing missed deadlines. In this paper, we extendtheir work by considering fair-scheduled multiprocess...

Journal: :PeerJ 2016
Margaret Miller Dana E Williams Brittany E Huntington Gregory A Piniak Mark J A Vermeij

The most common coral monitoring methods estimate coral abundance as percent cover, either via in situ observations or derived from images. In recent years, growing interest and effort has focused on colony-based (demographic) data to assess the status of coral populations and communities. In this study, we relied on two separate data sets (photo-derived percent cover estimates, 2002-12, and op...

2007
Jaume Ramis Loren Carrasco Guillem Femenias Felip Riera-Palou

Scheduling algorithms are fundamental components in the process of resource management in mobile communication networks with heterogeneous QoS requirements such as delay, delay jitter, packet loss rate or throughput. The random characteristics of the propagation environment and the use of complex physical layers in order to combat this random behavior does not ease in the design of simple, effi...

1980
Paul Eggers

Medicare provides incentive reimbursements to health maintenance organizations (HMOs) which enroll Medicare beneficiaries on a risk option and provide care at a lower cost than expected. The incentive reimbursements are tied to an actuarial calculation of Medicare Adjusted Average Per Capita Cost (AAPCC). The AAPCC adjusts for a number of variables which affect Medicare reimbursements and for w...

2017
P. Pardhasaradhi Prasad Reddy

With rapidly growing network, Internet has turned into an essential wellspring of transmitting confidential or secret data, for example, military data, money related records, and so forth. In such cases, strategies committed to ensure such kind of information are needed and they play an imperative role in providing confidential and secure transmission over network. Visual cryptography scheme is...

Journal: :MONET 2003
Anders Lindgren Andreas Almquist Olov Schelén

This paper evaluates four mechanisms for providing service differentiation in IEEE 802.11 wireless LANs. The evaluated schemes are the Point Coordinator Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordinator Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11, Distributed Fair Scheduling (DFS), and Blackburst. The evaluation was done using the ns-2 simulator. Furt...

2000
Sanjay K. Dhar Stephen J. Hoch

Assessing a retailer’s performance in a category is important to both manufacturers and retailers. The main objective of this paper is to understand the factors that determine across-retailer variation in category performance as measured by the Category Development Index (CDI). Based on data from 19 food categories sold in 85 major supermarket chains operating in the largest 50 retail markets i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید