Essays about: "plan execution"
Showing result 1 - 5 of 49 essays containing the words plan execution.
-
1. Identification of key factors that support and limit action plan implementation after a SimEx and suggestions on how to overcome the challenges
University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet; Lunds universitet/Riskhantering (CI)Abstract : It is difficult to prepare for events with large-scale consequences and low probability. Simulation exercises (SimEx) provide the opportunity to improve preparedness through strengthening capabilities before an actual emergency. Conducting a SimEx could be very expensive and therefore the SimEx should be thoroughly evaluated. READ MORE
-
2. Model Checked Reinforcement Learning For Multi-Agent Planning
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Autonomous systems, or agents as they sometimes are called can be anything from drones, self-driving cars, or autonomous construction equipment. The systems are often given tasks of accomplishing missions in a group or more. This may require that they can work within the same area without colliding or disturbing other agents' tasks. READ MORE
-
3. Optimizing databases in the cloud based on performance and cost savings
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As cloud service providers becomes more prevalent, so does questions related to cost efficiency of hosted resources. Payment models for cloud hosted resources tend to be either subscription based or pay-as-you-go for computing resources, in this case for compound metrics of CPU, Data IO and Log IO. READ MORE
-
4. Modernizing and Evaluating the Autotuning Framework of SkePU 3
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Autotuning is a method which enables a program to automatically choose the most suitable parameters that optimizes it for a certain goal e.g. speed, cost, etc. READ MORE
-
5. Enclave Host Interface for Security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE