نتایج جستجو برای: year

تعداد نتایج: 592979  

2008
Uta Jüttner Helen Peck Martin Christopher

In recent years the issue of supply chain risk has been pushed to the fore, initially by fears related to possible disruptions from the much publicised ‘millennium bug’. Y2K passed seemingly without incident, though the widespread disruptions caused by fuel protests and then Foot and Mouth Disease in the UK, and by terrorist attacks on the USA have underlined the vulnerability of modern supply ...

1999
Yinong Chen

Year 2000 bugs are just errors in the design of software and hardware which won’t be activated before the year 2000. Considering dates and times as a part of inputs, this paper uses general software testing and evaluation techniques as guidelines for testing year 2000 compliance of software systems. The lesson to learn from year 2000 problems is that the “minimum cost” design methodology may no...

Journal: :J. Applied Mathematics 2012
Piyanan Pasom Bancha Panyanak

Let C be a nonempty bounded closed convex subset of a complete CAT 0 space X. We prove that the common fixed point set of any commuting family of asymptotic pointwise nonexpansive mappings on C is nonempty closed and convex. We also show that, under some suitable conditions, the sequence {xk}k 1 defined by xk 1 1 − tmk xk ⊕ tmkT nk m y m−1 k, y m−1 k 1 − t m−1 k xk ⊕ t m−1 kT m−1y m−2 k, y m−2 ...

Journal: :Softw., Pract. Exper. 2014
Tanumoy Pati James H. Hill

Copyright c © 0000 John Wiley & Sons, Ltd. Softw. Pract. Exper. (0000) Prepared using speauth.cls DOI: 10.1002/spe

Journal: :Journal of Software: Evolution and Process 2016
Paul W. McBurney Cheng Liu Collin McMillan

Programs are, in essence, a collection of implemented features. Feature Discovery in software engineering is the task of identifying key functionalities that a program implements. Manual feature discovery can be time-consuming and expensive, leading to automatic feature discovery tools being developed. However, these approaches typically only describe features using lists of keywords, which can...

1999
Peter Harry Eidorff Fritz Henglein Christian Mossin Henning Niss Morten Heine Sørensen Mads Tofte

AnnoDomini is a commercially available source-to-source conversion tool for finding and fixing Year 2000 problems in COBOL programs. AnnoDomini uses type-based specification, analysis, and transformation to achieve its main design goals: flexibility, completeness, correctness, and a high degree of safe automation.

Journal: :Concurrency and Computation: Practice and Experience 2013
Evgenia Christoforou Antonio Fernández Chryssis Georgiou Miguel A. Mosteiro Ángel Sánchez

We consider Internet-based Master-Worker task computations, like SETI@home, where a master process sends tasks, across the Internet, to worker processes; workers execute, and report back some result. However, these workers are not trustworthy and it might be at their best interest to report incorrect results. In such master-worker computations, the behavior and the best interest of the workers ...

2005
Renato Falomo Jari Kotilainen

We present high spatial resolution near–infrared H-band (1.65 μm) images, taken with ISAAC on UT1 of ESO VLT, of three radio-loud quasars at z∼1.5, as a pilot study for imaging of a larger sample of radio-loud and radio-quiet quasars in the redshift range 1 < z < 2. We are able to clearly detect the host galaxy in two quasars (PKS 0000-177 and PKS 0348-120) and marginally in the third (PKS 0402...

Journal: :Numerical Lin. Alg. with Applic. 2013
Volker Mehrmann Federico Poloni

We propose a generalization of the Structured Doubling Algorithm (SDA) to compute invariant subspaces of structured matrix pencils that arise in the context of solving linear quadratic optimal control problems. The new algorithm is designed to attain better accuracy when the classical Riccati equation approach for the solution of the optimal control problem is not well suited because the stable...

2015
Jun Ho Huh Hyoungshick Kim Rakesh Bobba Masooda N. Bashir Konstantin Beznosov

To ensure that users do not choose weak personal identification numbers (PINs), many banks give out system-generated PINs, using computers to generate random PINs. 4-digit is the most commonly used PIN length, but 6-digit system-generated PINs are also becoming popular. The increased security we get from using system-generated PINs, however, comes at the cost of memorability. And while banks ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید