Listing 1 - 10 of 2318 | << page >> |
Sort by
|
Choose an application
Choose an application
Discovery, authentication, and authorization protocols between hosts and storage devices over multiple transports are defined in this standard.
Choose an application
This yearly workshop brings together researchers and practitioners of data science working in a variety of academic, commercial, industrial, or other sectors.
Choose an application
The European Conference on Software Architecture (ECSA), held this year from September 9th to 13th at the FIAP, in Paris, France, is a premier European software architecture conference providing researchers, practitioners, and educators with a platform to present and discuss the most recent, innovative and significant findings and experiences in the field of software architecture research and practice. This year was special, as we shared the venue and part of the program with the Systems & Software Product Lines Conference (SPLC). Some keynotes and tracks were common to both events. In addition to the main track, the conference featured various events and tracks including the Track on Women in Software Engineering (WSE), a Doctoral symposium, a Tool, demos and poster session, and six workshops. All these events were held with the aim to explore new trends and to support researchers in the early stages of their careers.
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
A major goal of the book is to continue a good tradition - to bring together reputable researchers from different countries in order to provide a comprehensive coverage of advanced and modern topics in scheduling not yet reflected by other books. The virtual consortium of the authors has been created by using electronic exchanges; it comprises 50 authors from 18 different countries who have submitted 23 contributions to this collective product. In this sense, the volume can be added to a bookshelf with similar collective publications in scheduling, started by Coffman (1976) and successfully continued by Chretienne et al. (1995), Gutin and Punnen (2002), and Leung (2004). This volume contains four major parts that cover the following directions: the state of the art in theory and algorithms for classical and non-standard scheduling problems; new exact optimization algorithms, approximation algorithms with performance guarantees, heuristics and metaheuristics; novel models and approaches to scheduling; and, last but least, several real-life applications and case studies.
Scheduling. --- Time management --- Algorithms & data structures
Choose an application
Abstract: A Protection Profile for Hardcopy Devices in a small, private information processing environment is discussed in this standard in which most elements of security are provided by the physical environment, but basic network security is needed to protect the device and its network from misuse from outside of the environment. Small offices and home offices are typical applications of this environment. This environment will be known as "Operational Environment D." Keywords: all-in-one, Common Criteria, copier, disk overwrite, document, document server, document storage and retrieval, facsimile, fax, hardcopy, ISO/IEC 15408, multifunction device (MFD), multifunction product (MFP), network, network interface, nonvolatile storage, office, paper, printer, Protection Profile, residual data, scanner, security target, shared communications medium, temporary data.
Listing 1 - 10 of 2318 | << page >> |
Sort by
|