Showing 1,181 - 1,200 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 1181

    Gestion de l’eau et projet de territoire : vers une gestion intégrée du delta du Rhône by Alain Dervieux, Geneviève Jolly, Aurélien Allouche

    Published 2006-12-01
    “…The executive water commission (CEDE) a non formal association of local water actors is commissioned to manage the water gates of the sea dike. …”
    Get full text
    Article
  2. 1182

    Monitoring of national projects in Russia and risks associated with their implementation by V. V. Stroev, N. V. Kuznetsov

    Published 2023-12-01
    “…The main documents that regulate national projects execution, the mechanism and structure of national projects monitoring have also been studied. …”
    Get full text
    Article
  3. 1183

    Features of management and implementation of financial and economic activities of various forms and types of institutions by A. Yu. Yakovlev

    Published 2018-12-01
    “…The actions of official duty institutions, created for the execution of works and the execution of state (municipal) functions are most constrained. …”
    Get full text
    Article
  4. 1184
  5. 1185

    Latency Improvement Strategies for Reliability-Aware Scheduling in Industrial Wireless Sensor Networks by Felix Dobslaw, Tingting Zhang, Mikael Gidlund

    Published 2015-10-01
    “…SchedEx has proven to quickly produce TDMA schedules that guarantee a user-defined end-to-end reliability level ρ _ for all multihop communication in a WSN. Moreover, SchedEx executes orders of magnitude faster than recent algorithms in the literature while producing schedules with competitive latencies. …”
    Get full text
    Article
  6. 1186

    Automated generation of dispatching rules for the green unrelated machines scheduling problem by Nikolina Frid, Marko Ɖurasević, Francisco Javier Gil-Gala

    Published 2024-12-01
    “…The total energy consumed during the system execution is optimised along with two standard scheduling criteria. …”
    Get full text
    Article
  7. 1187

    High-performance directional fuzzing scheme based on deep reinforcement learning by Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU

    Published 2023-04-01
    “…With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.…”
    Get full text
    Article
  8. 1188

    Bypass node non-redundant adding algorithm for crossing-level data transmission in two-dimension reconfigurable cell array by Nai-jin CHEN, Zhi-yong FENG, Jian-hui JIANG

    Published 2015-04-01
    “…As for the problem of hardware task crossing-level data transmission,a preorder traversing backtracking adding_bypass_node (PTBA) algorithm is presented which maintains logic relation among original computing nodes and does not add redundancy nodes based on data flow graph with crossing-level-in-tree(CLIT) and crossing-level-out-tree (CLOT).The pipelined model of partitioning mapping and the quantitative evaluation indexes are presented for the dynamic reconfigurable system.The critical condition of PTBA mapping is proposed.Compared with preorder traversing backtracking no adding_bypass_node (PTBNA) mapping,and under the premise of critical condition,experimental results show PTBA mapping can improve the number of modules,the number of non-original input times and non-original output times,the total execution delay and powers of all partitioning based on the same system architecture and partitioning mapping algorithm.The proposed algorithm obtains the less average execution total cycles by 23.3%(RCA<sub>5×5</sub>),30.5%(RCA<sub>8×8</sub>),and the less average power consumption by 15.7%(RCA<sub>5×5</sub>),18.6%(RCA<sub>8×8</sub>) than previous advanced split-push kernel mapping(SPKM).PTBA has rationality and effectiveness.…”
    Get full text
    Article
  9. 1189

    Humour in the management of multiple sclerosis: a scoping review by M. Šeduikienė, V. Matonis

    Published 2023-11-01
    “…Appropriate use of humour (among other factors) can significantly improve the neuropsychological status in persons with RRMS and help them staying employed. Executive function and personalized long-term prognosis for PwMS are to some extent related to humor. …”
    Get full text
    Article
  10. 1190

    Solving the Problem of Time, Cost, and Quality Trade-Off in Project Scheduling under Fuzzy Conditions Using Meta-Heuristic Algorithms by Hojjatullah Ghadir, Seyed Ahmad Shayannia, Mehdi Amir Miandargh

    Published 2022-01-01
    “…Indeed, the use of search methods to determine the optimal execution methods of each activity requires the evaluation and review of various performance criteria such as time, cost, and especially the final quality of each activity. …”
    Get full text
    Article
  11. 1191

    CEO Characteristics and Earnings Management: A Study of Manager Tenure, Age, Gender, and Overconfidence by Chen Sitao, Tzavara Dionisia, Argyropoulou Maria, Koufopoulos Dimitrios, Argyropoulou Rachel

    Published 2024-12-01
    “…While previous studies mainly use data from US companies, this research contributes to the literature by using data from non-US companies, addressing the call for more empirical studies to understand how top executives’ demographic characteristics impact earnings management in different contexts.…”
    Get full text
    Article
  12. 1192
  13. 1193

    Quantum many-body physics calculations with large language models by Haining Pan, Nayantara Mudur, William Taranto, Maria Tikhanovskaya, Subhashini Venugopalan, Yasaman Bahri, Michael P. Brenner, Eun-Ah Kim

    Published 2025-01-01
    “…We evaluate GPT-4’s performance in executing the calculation for 15 papers from the past decade, demonstrating that, with the correction of intermediate steps, it can correctly derive the final Hartree-Fock Hamiltonian in 13 cases. …”
    Get full text
    Article
  14. 1194

    The Significance of the 2014 Corporate Governance Code of the Bank of Russia by A. V. Shashkova

    Published 2014-08-01
    “…Corporate Governance Code regulates a number of the most important issues of corporate governance such as shareholders'rights and fair treatment of shareholders; Board of Directors; Corporate Secretary of the Company; system of remuneration of members of the Board of Directors, executive bodies and other key executives of the company; system of risk management and internal control; disclosure of information about the company, the information policy of the company; major corporate actions. …”
    Get full text
    Article
  15. 1195

    Improving outcomes for care leavers: evaluating a care leaver's assessment of need tool by Wendy Harrington

    Published 2006-03-01
    “…Their vulnerability to homelessness, poor educational achievement, mental ill health and offending (Biehal, Claydon, Stein and Wade,1992; Stein and Wade, 2000; Scottish Executive, 2002a) is well understood but this understanding has not necessarily led to improved practice.…”
    Article
  16. 1196

    Respek vir die lewe en die doodstraf volgens die perspektief van Genesis 9:5-6 by P. Verster

    Published 2004-12-01
    “…In postmodern society it is considered inhumane to execute persons who committed murder. In this article different views are discussed and it is suggested that, according to Genesis 9:5, respect for life is absolute and that, although the death penalty is not explicitly mentioned, it provides an argument for upholding respect for life. …”
    Get full text
    Article
  17. 1197

    The participation of children and young people in the recruitment of residential child care staff in Scotland by Helen Kay, Irene Stevens

    Published 2006-03-01
    “…In 2004, the Scottish Executive commissioned research from the Scottish Institute of Residential Child Care (SIRCC) to identify current recruitment practices in residential child care. …”
    Article
  18. 1198

    Agility Factors’ Analyses Framework in Project-Oriented Organizations through a Sustainability Approach in Large Projects Case Study: Isfahan Municipality by Ahmadreza Tahanian, Hasan Haleh, Farhad Etebari, Behnam Vahdani

    Published 2021-01-01
    “…Thereafter, the importance of these two major components has been measured by executive managers in Isfahan Municipality and academic experts. …”
    Get full text
    Article
  19. 1199

    Impairment in Theory of Mind in Parkinson’s Disease Is Explained by Deficits in Inhibition by Jennifer A. Foley, Claire Lancaster, Elena Poznyak, Olga Borejko, Elaine Niven, Thomas Foltynie, Sharon Abrahams, Lisa Cipolotti

    Published 2019-01-01
    “…Participants also completed a battery of standard measures of social and executive functioning, including measures of inhibition. …”
    Get full text
    Article
  20. 1200

    A Self-Checking Hardware Journal for a Fault-Tolerant Processor Architecture by Mohsin Amin, Abbas Ramazani, Fabrice Monteiro, Camille Diou, Abbas Dandache

    Published 2011-01-01
    “…Fault tolerance here relies on the use of error detection techniques in the processor core together with journalization and rollback execution to recover from erroneous situations. Effective rollback recovery is possible thanks to using a hardware journal and chosing a stack computing architecture for the processor core instead of the usual RISC or CISC. …”
    Get full text
    Article