Search results for "Format"
showing 10 items of 24643 documents
notice biographique de Paul Faucher dans dictionnaire mouvement ouvrier, mouvement social (Le Maitron, P5)
2009
International audience; FAUCHER Paul, Henri, Jean (1904-1967). Administrateur de la FNOSS (Fédération nationale des organismes de Sécurité sociale) ; président de la Caisse Régionale de Sécurité sociale de Bourgogne ; cofondateur après la Libération, de l'Union départementale des Syndicats CGT-FO de la Côte d'Or ; secrétaire du syndicat CGT-FO des personnels des Impôts ; Officier du Mérite Social, Chevalier de la Légion d'Honneur, ainsi que Chevalier dans l'Ordre de la Santé Publique.
L’OUTIL ET L’ETHOS
2015
On hésite à formuler cette évidence : le monde des organisations, en général, des marques, en particulier, constitue un univers permanent de signes et de sens, à la fois naturalisé et complexe. Rien d'étonnant, donc, à concevoir, dans le sillage exemplaire de Jean-‐Marie Floch (1990), les relations logiques et partant, épistémologiques, entre sémiotique, marketing et communication, pour appréhender marques et organisations. Pour autant, à remonter aux sources, ces relations de solidarité ont connu un parcours au ralenti, parfois contrarié, souvent négligé, au profit d'autres champs d'application, de la sémiotique aux organisations, ou d'autres approches, de la communication des organisatio…
Usytuowanie ustrojowo-polityczne ochrony informacji niejawnych w Polsce, Czechach i na Słowacji
2022
Za system ochrony informacji niejawnych w Polsce odpowiadają służby specjalne. W Czechach i na Słowacji do prowadzenia działań w tym zakresie powołano centralne urzędy cywilne działające poza systemem służb specjalnych. Instytucje zajmujące się ochroną informacji niejawnych w polskim systemie ustrojowym i konstytucyjnym są nadzorowane głównie przez władzę wykonawczą — premiera, podczas gdy w Czechach i na Słowacji głównym czynnikiem kontrolnym w systemie są specjalne komisje parlamentarne. Ochronę praw osób, których dane są przetwarzane w ramach różnego rodzaju postępowań prowadzonych przez takie organy, gwarantują we wszystkich analizowanych systemach politycznych sądy. Na Słowacji jest to…
Model selection using limiting distributions of second-order blind source separation algorithms
2015
Signals, recorded over time, are often observed as mixtures of multiple source signals. To extract relevant information from such measurements one needs to determine the mixing coefficients. In case of weakly stationary time series with uncorrelated source signals, this separation can be achieved by jointly diagonalizing sample autocovariances at different lags, and several algorithms address this task. Often the mixing estimates contain close-to-zero entries and one wants to decide whether the corresponding source signals have a relevant impact on the observations or not. To address this question of model selection we consider the recently published second-order blind identification proced…
Surrogate-assisted evolutionary multiobjective shape optimization of an air intake ventilation system
2017
We tackle three different challenges in solving a real-world industrial problem: formulating the optimization problem, connecting different simulation tools and dealing with computationally expensive objective functions. The problem to be optimized is an air intake ventilation system of a tractor and consists of three computationally expensive objective functions. We describe the modeling of the system and its numerical evaluation with a commercial software. To obtain solutions in few function evaluations, a recently proposed surrogate-assisted evolutionary algorithm K-RVEA is applied. The diameters of four different outlets of the ventilation system are considered as decision variables. Fr…
Supporting Cyber Resilience with Semantic Wiki
2016
Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…
Simultaneous optimization of harvest schedule and measurement strategy
2013
In many recent studies, the value of forest inventory information in the harvest scheduling has been examined. Usually only the profitability of measuring simultaneously all the stands in the area is examined. Yet, it may be more profitable to concentrate the measurement efforts to some subset of them. In this paper, the authors demonstrate that stochastic optimization can be used for defining the optimal measurement strategy simultaneously with the harvest decisions. The results show that without end-inventory constraints, it was most profitable to measure the stands that were just below the medium age. Measuring the oldest stands was not profitable at all. It turned out to be profitable t…
Generalizability and Simplicity as Criteria in Feature Selection: Application to Mood Classification in Music
2011
Classification of musical audio signals according to expressed mood or emotion has evident applications to content-based music retrieval in large databases. Wrapper selection is a dimension reduction method that has been proposed for improving classification performance. However, the technique is prone to lead to overfitting of the training data, which decreases the generalizability of the obtained results. We claim that previous attempts to apply wrapper selection in the field of music information retrieval (MIR) have led to disputable conclusions about the used methods due to inadequate analysis frameworks, indicative of overfitting, and biased results. This paper presents a framework bas…
Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study
2016
In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…
Supporting Agile Development by Facilitating Natural User Interaction with Executable Formal Specifications
2011
Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natural participation in the development process, it is necessary to use a real end-user interface and bind it to the execution environment being used in the simulations and animations. This requires, though, that the execution model used to simulate the specification is appropriately changed to facilitate the use of these user interfaces. The authors…