• Aucun résultat trouvé

computer systems

Safety, Reliability and Security of Industrial Computer Systems

Safety, Reliability and Security of Industrial Computer Systems

... of systems (and not just computer ...new systems will take into account the accident reports concerning failures experienced with similar ...the systems, automation merely increases the ...

4

Classes of defense for computer systems

Classes of defense for computer systems

... that computer security incidents involve both access and harm components—sometimes clearly separable from each other, and sometimes less so—and that defenses tend to be oriented along one of these ...a ...

181

"Computer ""Insecurity"" and Viral Attacks:Liability Issues Regarding Unsafe Computer Systems Under Quebec Law"

"Computer ""Insecurity"" and Viral Attacks:Liability Issues Regarding Unsafe Computer Systems Under Quebec Law"

... Fault 7. Fault can be inferred in two different ways. The easiest and most trivial is by establishing that the defendant has committed an act which is contrary to law[12]. The second, which is more complex in its ...

15

Centralized versus decentralized computer systems : a new approach to organizational impacts

Centralized versus decentralized computer systems : a new approach to organizational impacts

... systems for the campuses which adequately serve local needs, the central computer staff is dependent upon local campuses to describe and define. the parameters of their needs[r] ...

70

Computer systems with a very large address space and garbage collection

Computer systems with a very large address space and garbage collection

... An object oriented machine must use object references to refer to very small objects such as integers and booleans as well as larger objects. If the abstract def[r] ...

267

Computer Systems Requirements of the Canadian Construction Materials Centre

Computer Systems Requirements of the Canadian Construction Materials Centre

... L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. Internal Rep[r] ...

23

Achieving consensus in fault-tolerant distributed computer systems : protocols, lower bounds, and simulations

Achieving consensus in fault-tolerant distributed computer systems : protocols, lower bounds, and simulations

... Using our new reduction, we prove that if there is any i-normal execution of a lazy distributed firing squad protocol in which the correct processors fire before ro[r] ...

152

Advancing Typology of Computer-Supported Influence: Moderation Effects in Socially Influencing Systems

Advancing Typology of Computer-Supported Influence: Moderation Effects in Socially Influencing Systems

... of computer systems become better equipped with ways of how both persuasion and social influ- ence can be operationalized more ...computing systems, then the fixed content (FC), fixed designed (FD), ...

13

o.OM: Structured-Functional Communication between Computer Music Systems using OSC and Odot

o.OM: Structured-Functional Communication between Computer Music Systems using OSC and Odot

... 6. Conclusion We have presented some applications of the odot framework and expression language in the OpenMusic computer-aided composi- tion and visual programming environment. Odot expressions oper- ate directly ...

8

The TASTE Toolset: turning human designed heterogeneous   systems into computer built homogeneous software.

The TASTE Toolset: turning human designed heterogeneous systems into computer built homogeneous software.

... embedded systems are heterogeneous by nature and that a unique UML-like language was not helping neither their construction, nor their ...software-based systems that one can straightforwardly download and ...

11

Decision systems performance: an experimental investigation of computer-aided management decision making.

Decision systems performance: an experimental investigation of computer-aided management decision making.

... DSS-aided decision making will result in decisions whose quality has a higher rate of improvement than non-aided decision making in similar, controlled circumstances. This hypo[r] ...

205

Computer Components and Systems

Computer Components and Systems

... These coefficients are a function of the optical parameter and are proportional to Q, the complex magneto-optic amplitude which, in turn, is pro- portional to the [r] ...

14

Computer Research

Computer Research

... A multi-user computation facility has been built around the PDP-1 computer given to the Department of Electrical Engineering, M.. by the Digital Equipment Corpor- at[r] ...

2

Computer Vision

Computer Vision

... Droogenbroeck Computer Vision Academic year: 2019-2020 333 / 596 Deep learning for visual understanding General view Where are the difficulties ? It might seem now that deep learning can virtually solve any ...

301

Computer gardening

Computer gardening

... It takes eight bits from the green channel of the Grinnel and converts it to the carving data format.. the other depend ing on whether they are above or below mid[r] ...

78

Computer Research

Computer Research

... The purpose of this group, which is operated jointly by the Research Laboratory of Electronics, the Electronic Systems Laboratory, and the Department of Electrical [r] ...

2

Computer Research

Computer Research

... The purpose of this group, which is operated jointly by the Research Laboratory of Electronics, the Electronic Systems Laboratory, and the Department of Electrical [r] ...

2

Computer Research

Computer Research

... Our experience with TX-0 has shown that on-line communication between the user and machine allows the user to progress faster in his research with less effort on[r] ...

2

Computer Research

Computer Research

... The bit combina- tions associated with the symbols cause the corresponding actions in Chart 3 to occur in the time sequence indicated above... The previous contents[r] ...

8

Computer Research

Computer Research

... that collectively accomplish a computing task. Each computation runs on behalf of a user of the system and has an associated sphere of protection that determines [r] ...

4

Show all 7232 documents...

Sujets connexes