• No results found

Common Information Model

Development of a Database for the Common Information Model of Power Grids

Development of a Database for the Common Information Model of Power Grids

... a model instance to some previous state in more de- ...historical model, and how it is used for tracking ...historical model is ...active model, we create a new history table, where we store ...

14

SLA-driven Management of Distributed Systems using the Common Information Model

SLA-driven Management of Distributed Systems using the Common Information Model

... However, the principle of implementing every CIM provider on a per-class basis could not be hold up for the implementation of the IBM ArithmeticCompositeMetric , IBM StatisticalCompositeMetric , and IBM TimeSeries ...

13

HIPAA and Meaningful User Audit Reports Using Splunk

HIPAA and Meaningful User Audit Reports Using Splunk

... Application written speci fi cally for Cerner EHR for MU2. Common Information Model in development[r] ...

34

SPEIR: developing a common information environment in Scotland

SPEIR: developing a common information environment in Scotland

... and Information Council to identify, research, and develop the elements of an internationally interoperable Scottish Common Information Environment (SCIE) for Library, Museum and Archive domain ...

13

Information aggregation, costly voting and common values

Information aggregation, costly voting and common values

... the common value specification of this paper, and the private values specification of ...the model has a voting equilibrium where all agents vote with their signals, rather than according to their ...

21

The Internationalisation of Information Privacy: Towards a Common Protection

The Internationalisation of Information Privacy: Towards a Common Protection

... Last, the widespread and provoking data protection invasions have greatly contributed to a common recognition of the significance of information privacy across the world. Snowden’s major revelations ...

13

Information Guide: Common Foreign and Security Policy

Information Guide: Common Foreign and Security Policy

... The Common Foreign and Security Policy (CFSP) was introduced by the 1993 Treaty on European Union (TEU), under which it formed the second of the Union’s pillar ...

11

A Simulator Framework for Naval Electronic Information System

A Simulator Framework for Naval Electronic Information System

... electronics information system and taking the expansibility of simulators and the portability of models into account, a simulator software framework for naval electronic information system is designed in ...

8

Common Information in Carry Trade Risk Factors

Common Information in Carry Trade Risk Factors

... The carry trade is an investment strategy that involves borrowing in a low interest rate currency and investing in a high interest rate currency. Applying this strategy to many currencies allows for the building of ...

33

1 THE BUSINESS NEEDS

1 THE BUSINESS NEEDS

... ECM customers are looking for a solution that provides a common technology for many different applications. Departmental applications have evolved to add elements that address specific vertical market needs. Many ...

15

A comparison of nested and cross cutting common ingroup identities and the role of ingroup projection, distinctiveness and intergroup threat on outgroup attitudes

A comparison of nested and cross cutting common ingroup identities and the role of ingroup projection, distinctiveness and intergroup threat on outgroup attitudes

... important to evaluate the ingroup as normative and positive and therefore essential, to make ingroup projection feasible. Therefore, it may be the case that the cross-cutting CII had more clear and distinctive features ...

48

Integrating BIM into facility management: Typology matrix of information handover requirements

Integrating BIM into facility management: Typology matrix of information handover requirements

... requirements model, which challenges the common approach for promoting hand over of data and information between BIM and FM, with disregard from the fit and categorisation of these ...and ...

23

Schaaf, Thomas
  

(2008):


	IT-gestütztes Service-Level-Management: Anforderungen und Spezifikation einer Managementarchitektur.


Dissertation, LMU München: Fakultät für Mathematik, Informatik und Statistik

Schaaf, Thomas (2008): IT-gestütztes Service-Level-Management: Anforderungen und Spezifikation einer Managementarchitektur. Dissertation, LMU München: Fakultät für Mathematik, Informatik und Statistik

... Abbildung 4.2 illustriert die Anwendung verschiedener Arten von Dienst- Template-Modellen, die eine zentrale Komponente des statischen Dienstmo- dells im Kontext des Dienstmanagement-Rahmenwerks darstellen. Ausgehend vom ...

440

Announcements and the role of policy guidance

Announcements and the role of policy guidance

... sector information (moving across rows from left to right) and decreasing in the quality of central bank information (comparing the top panel to the bottom ...private information makes expectations ...

22

Joint spatial modelling of disease risk using multiple sources: an application on HIV prevalence from antenatal sentinel and demographic and health surveys in Namibia

Joint spatial modelling of disease risk using multiple sources: an application on HIV prevalence from antenatal sentinel and demographic and health surveys in Namibia

... A stochastic partial differential equation (SPDE) ap- proach with R-INLA was employed to estimate pos- terior marginal distributions and any other posterior inferences. Convex hull meshes (Fig. 1) on study area were used ...

16

MRSA model of learning and adaptation: a qualitative study among the general public

MRSA model of learning and adaptation: a qualitative study among the general public

... Learning by the participants in this study was achieved primarily through two channels - people and media. Peo- ple, both social networks and healthcare professionals, were important sources of information about ...

10

Arts and the Common Core: A Scan of State Education Agencies and National Arts Organizations. Sharon A. Herpin Adrienne Quinn Washington

Arts and the Common Core: A Scan of State Education Agencies and National Arts Organizations. Sharon A. Herpin Adrienne Quinn Washington

... the information gleaned from the website ...the Common Core have been ...the Common Core and identifying the role the arts can play in implementing the Common Core State ...and Common ...

22

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August Version 2.

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August Version 2.

... modification, or loss of use. The categories of protection relating to these three types of failure of security are commonly called confidentiality, integrity, and availability, respectively. The CC may also be ...

61

Multidimensional Design from XML Sources for the Integral Analytical Model

Multidimensional Design from XML Sources for the Integral Analytical Model

... It should: • focus on the on-line analytical processing [1, 2]; • be able to convert various data formats into the common model without loss of information; • support the automated match[r] ...

5

FUNCTIONAL REQUIREMENTS AND TECHNICAL SPECIFICATIONS OF AMI/MDM SYSTEM

FUNCTIONAL REQUIREMENTS AND TECHNICAL SPECIFICATIONS OF AMI/MDM SYSTEM

... Customer Information System (CIS) at the level of electric utility, will be the subject of a detailed programme to be developed in the course of designing and it will depend on the final implementation of the  ...

216

Show all 10000 documents...

Related subjects