Showing 6,981 - 7,000 results of 31,041 for search '"strategy"', query time: 0.14s Refine Results
  1. 6981

    Study on virtual resource allocation optimization in cloud computing environment by Li XU, Zhi-bin ZENG, Chuan YAO

    Published 2012-09-01
    “…Most existing researches of resource allocation in data center did not take into full consideration how to decrease energy consumption.The energy efficiency virtual resource allocation for cloud computing as a multi-objective optimization problem was formulated,which was then solved by intelligent optimization algorithm.The simulation results reveal that the strategy can successfully generate schedule scheme of different numbers of servers-VM with diverse characteristics and decrease the total operating energy of data center effectively.…”
    Get full text
    Article
  2. 6982

    Group Scheduling with Learning Effect and Random Processing Time by Dingyu Wang, Chunming Ye

    Published 2021-01-01
    “…We take the long expected schedule and the expected total completion time as the objective function, and the noninterruptible static priority strategy is obtained. At the same time, heuristic algorithms and examples are given.…”
    Get full text
    Article
  3. 6983

    Gender Stereotypes in Some Romantic Travelogues (and How to Use Them) by Anne ROUHETTE

    Published 2016-12-01
    “…My purpose here is not to look for a specifically masculine or feminine type of travel writing, but to analyse how the openly gendered dimension of the text impacts its reception, to the extent that it may be said to partake of a strategy aiming at conveying a sometimes radical discourse.…”
    Get full text
    Article
  4. 6984

    Be to, grammaticalisation et ambiguïté énonciative by Françoise Lachaux

    Published 2012-11-01
    “…As the title indicates, this paper addresses the issues of grammaticalization and ambiguity, and the relation between the two, in the case of the be to construction.As a verbal periphrasis devoid of any lexical element, only to be found in the simple present and simple preterite (*be to, *being to, *been to), and so very concise as to be labelled as “minimalist”, be to raises several challenging questions, concerning its alledged closeness to passive constructions (such as be supposed to / be expected to), and its superficial morphological similarity with have to.The apparent absence of any marks of involvement on the speaker’s part, together with the cognitive gap created by the lack of lexical basis, leave a vacuum on the semantic and pragmatic levels: could grammaticalization be linked with some strategy of concealment and implicit modality?…”
    Get full text
    Article
  5. 6985

    Research progress of access control model and policy in online social networks by Tian-zhu CHEN, Yun-chuan GUO, Ben NIU, Feng-hua LI

    Published 2016-08-01
    “…As one of the effective approach to protecting information,access control which makes the information only accessed by legitimate users and prevents information leakage,has been widely used in online social networks.The characteristics of OSN were analyzed.From two angles of access control model and access control strategy,the research of access control in online social networks were discussed deeply,the related research was counted and analyzed.…”
    Get full text
    Article
  6. 6986

    Suboptimal Event-Triggered Consensus of Multiagent Systems by Yuan Fan

    Published 2014-01-01
    “…The effectiveness of the proposed strategy is illustrated by numerical examples.…”
    Get full text
    Article
  7. 6987

    Paternalismo industrial y control social. Las experiencias disciplinadoras en la minería del carbón en Chile, Lota y Coronel en la primera mitad del siglo XX by Hernán Venegas Valdebenito

    Published 2015-11-01
    “…The article examine the transformations of these strategy, particularly those recognized under the concept of patronage and paternalism industrial, and how the latter is characterized by the intensity of control and sense of it all-encompassing. …”
    Get full text
    Article
  8. 6988

    Bilateral Bulky Adrenal Plasmacytomas with Very Good Response to Daratumumab-Based Therapy by Fang-Yu Wang, Han-Kuang Hsieh, Tso-Fu Wang, Yi-Feng Wu

    Published 2023-04-01
    “…An optimal treatment strategy for this clinical subset has not yet been clarified. …”
    Get full text
    Article
  9. 6989

    L’Amazonie péruvienne contemporaine au miroir de sa littérature : « Sélection Loreto 2006 » by Catherine Heymann

    Published 2011-06-01
    “…In 2006, at the end of a contest, Loreto’s Regional Government (Peru), published a selection of contemporary authors, who where born or lived in the Amazon basin. Integrated into a strategy of regional development, this cultural politics aimed to bring national and worldwide fame to the Amazonian writers, especially to those from the Loreto Department. …”
    Get full text
    Article
  10. 6990

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…Experimental results have been shown that the performance of the proposed strategy can resist effectively two types of linear collusion attacks while still being robust, stable and imperceptible.…”
    Get full text
    Article
  11. 6991

    Allelopathy: How Plants Suppress Other Plants by James J. Ferguson, Bala Rathinasabapathi, Carlene A. Chase

    Published 2013-03-01
    “…This 5-page fact sheet introduces the concept of allelopathy and mentions potential applications as an alternative weed management strategy. Written by James J. Ferguson, Bala Rathinasabapathi, and Carlene A. …”
    Get full text
    Article
  12. 6992

    Video steganalysis scheme based on inter-frame collusion by LIU Bin, LIU Fen-lin, YANG Chun-fang

    Published 2009-01-01
    “…An inter-frame collusion based video steganalysis scheme(ICS) was proposed by utilizing the temporal corre-lation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video se-quence decreased the detection accuracy of steganalysis algorithms,which were taken into account in ICS steganalysis scheme by modeling motions and messages in video frame as a bimodal noise.Suspicious video frames were recognized by decision module employing GRNN classifier with features extracted by the inter-frame correlation strategy.Experi-mental results show the satisfying performance of the proposed scheme.…”
    Get full text
    Article
  13. 6993

    Les genres récrits : chronique n° 7 by Daniel Elmiger

    Published 2020-12-01
    “…Today, so-called generically used feminine forms, i.e. the use of grammatically feminine forms to refer to women and men (or non-binary people) are sometimes used as an inclusive writing strategy. It functions in a similar way to generically used masculine forms. …”
    Get full text
    Article
  14. 6994

    La politique étrangère de Donald Trump : une perspective civilisationnelle ? by Jacob Maillet

    Published 2018-09-01
    “…By reviewing the great motions of American foreign policy since the election of the 45th president, this article tries to determine if the Trump administration follows a coherent strategy.…”
    Get full text
    Article
  15. 6995

    ANALYSIS OF THE RESULTS OF THE RUSSIAN STRATEGIC IMPLEMENTATION PROGRAM OF INNOVATIVE DEVELOPMENT by A. Gyzyev

    Published 2018-01-01
    “…The basic tasks of the innovative development program are analyzed, the main indicators of innovative activity of the country are presented, problems of realization of innovative strategy are revealed.…”
    Get full text
    Article
  16. 6996

    THE MAIN DETERMINANTS OF THE TOOLS OF FINANCIAL PLANNING AS AN INDICATIVE SCHEME OF REDUCTION OF CRISIS SITUATIONS by S. Yunusova, A. Bodiako

    Published 2017-07-01
    “…Besides the differentiated exit methods from crisis situations of the company are considered. Reflection of strategy of the company through Issikava's chart is offered and also the budgeting tools quintessence is defined. …”
    Get full text
    Article
  17. 6997

    INTERNATIONALIZATION IN HIGHER PROFESSIONAL EDUCATION IN RUSSIA: BACKGROUND, GEARS, INCENTIVES, LANGUAGE POLICY by Kira M. Inozemtseva

    Published 2016-12-01
    “…The role of university language policy in implementing the government strategy of HPE internationalization is determined.…”
    Get full text
    Article
  18. 6998

    Robust Policy in Times of Pandemic by Jan Willem Van den End, Yakov Ben-Haim

    Published 2021-04-01
    “…While policymakers have to act forcefully to mitigate the impact on the economy, these conditions call for policy strategies that are also robust to uncertainty. This article compares two concepts of robust strategies: robust control and robust satisficing. …”
    Get full text
    Article
  19. 6999

    Relationship CHANGE: How to Change Your Relationships for GOOD by Victor William Harris

    Published 2012-03-01
    “…This 3-page fact sheet introduces the principle of Change Yourself First as a healthy strategy for changing our relationships. Written by Victor William Harris, and published by the UF Department of Family, Youth and Community Sciences, March 2012. …”
    Get full text
    Article
  20. 7000

    COMMITTEES UNDER THE BOARD OF DIRECTORS OF JOINT STOCK COMPANY AS A TOOL OF CORPORATE MANAGEMENT AND FINANCIAL CONTROL by A. Yakovlev

    Published 2018-10-01
    “…There are quite significant differences in the companies regarding the number and focus of committees. The audit, strategy, personnel and remuneration committees are the most common, more rarely - investment committees and budget.…”
    Get full text
    Article