نتایج جستجو برای: year
تعداد نتایج: 592979 فیلتر نتایج به سال:
In recent years the issue of supply chain risk has been pushed to the fore, initially by fears related to possible disruptions from the much publicised ‘millennium bug’. Y2K passed seemingly without incident, though the widespread disruptions caused by fuel protests and then Foot and Mouth Disease in the UK, and by terrorist attacks on the USA have underlined the vulnerability of modern supply ...
Year 2000 bugs are just errors in the design of software and hardware which won’t be activated before the year 2000. Considering dates and times as a part of inputs, this paper uses general software testing and evaluation techniques as guidelines for testing year 2000 compliance of software systems. The lesson to learn from year 2000 problems is that the “minimum cost” design methodology may no...
Let C be a nonempty bounded closed convex subset of a complete CAT 0 space X. We prove that the common fixed point set of any commuting family of asymptotic pointwise nonexpansive mappings on C is nonempty closed and convex. We also show that, under some suitable conditions, the sequence {xk}k 1 defined by xk 1 1 − tmk xk ⊕ tmkT nk m y m−1 k, y m−1 k 1 − t m−1 k xk ⊕ t m−1 kT m−1y m−2 k, y m−2 ...
Copyright c © 0000 John Wiley & Sons, Ltd. Softw. Pract. Exper. (0000) Prepared using speauth.cls DOI: 10.1002/spe
Programs are, in essence, a collection of implemented features. Feature Discovery in software engineering is the task of identifying key functionalities that a program implements. Manual feature discovery can be time-consuming and expensive, leading to automatic feature discovery tools being developed. However, these approaches typically only describe features using lists of keywords, which can...
AnnoDomini is a commercially available source-to-source conversion tool for finding and fixing Year 2000 problems in COBOL programs. AnnoDomini uses type-based specification, analysis, and transformation to achieve its main design goals: flexibility, completeness, correctness, and a high degree of safe automation.
We consider Internet-based Master-Worker task computations, like SETI@home, where a master process sends tasks, across the Internet, to worker processes; workers execute, and report back some result. However, these workers are not trustworthy and it might be at their best interest to report incorrect results. In such master-worker computations, the behavior and the best interest of the workers ...
We present high spatial resolution near–infrared H-band (1.65 μm) images, taken with ISAAC on UT1 of ESO VLT, of three radio-loud quasars at z∼1.5, as a pilot study for imaging of a larger sample of radio-loud and radio-quiet quasars in the redshift range 1 < z < 2. We are able to clearly detect the host galaxy in two quasars (PKS 0000-177 and PKS 0348-120) and marginally in the third (PKS 0402...
We propose a generalization of the Structured Doubling Algorithm (SDA) to compute invariant subspaces of structured matrix pencils that arise in the context of solving linear quadratic optimal control problems. The new algorithm is designed to attain better accuracy when the classical Riccati equation approach for the solution of the optimal control problem is not well suited because the stable...
To ensure that users do not choose weak personal identification numbers (PINs), many banks give out system-generated PINs, using computers to generate random PINs. 4-digit is the most commonly used PIN length, but 6-digit system-generated PINs are also becoming popular. The increased security we get from using system-generated PINs, however, comes at the cost of memorability. And while banks ar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید