Doctors' Personalized Outpatient Scheduling via the Many to Many Assignment with Spatio-temporal Constraints

Author(s):  
Lu Liang ◽  
Nanfang Wang ◽  
Yanhua Zhu ◽  
Dongning Liu
2007 ◽  
Vol 30 (4) ◽  
pp. 666-678 ◽  
Author(s):  
Florence Rosey ◽  
Jean Keller ◽  
Eveline Golomer

Author(s):  
Anthony Cordingley

This chapter explores the impact of the dialectics of the Ancient world after Plato upon Beckett’s French novels and the peculiar set of relations between characters and their physical environment in How It Is. It accounts for the presence of Aristotelian ideas of cosmic order, syllogism, space and time. Beckett’s study of formal logic as a student at Trinity College, Dublin and his private study of philosophy in 1932 is examined in this light; particularly his “Philosophy Notes,” along with further sources for his knowledge. The Aristotelian world view of his “I” is shown to be confronted with a set of relations resembling those of the Ancient Greek Stoics. The materiality of spatio-temporal relations in How It Is and the metaphysical coordinates between the “I”, its cosmos and any transcendent other are interrogated. The dialectic between Aristotelian and Stoic physics and metaphysics in How It Is emerges as a conceptual framework for exploring many of the novel’s contradictions, as well as the many confusions and digressions of its narrator/narrated. Beckett’s creative transformation of this ancient dialectic is shown, furthermore, to lead him to formal innovations, such as the novel’s continuous present tense and its complex narrative structure.


Big Data ◽  
2016 ◽  
pp. 441-453
Author(s):  
Min Chen

In this chapter, the author proposes a hierarchical security model (HSM) to enhance security assurance for multimedia big data. It provides role hierarchy management and security roles/rules administration by seamlessly integrating the role-based access control (RBAC) with the object-oriented concept, spatio-temporal constraints, and multimedia standard MPEG-7. As a result, it can deal with challenging and unique security requirements in the multimedia big data environment. First, it supports multilayer access control so different access permission can be conveniently set for various multimedia elements such as visual/audio objects or segments in a multimedia data stream when needed. Second, the spatio-temporal constraints are modeled for access control purpose. Finally, its security processing is efficient to handle high data volume and rapid data arrival rate.


Sign in / Sign up

Export Citation Format

Share Document