Fund og Forskning i Det Kongelige Biblioteks Samlinger
Dette er et online særnummer. Værkfortegnelsen er ordnet alfabetisk efter første ord i titlen. Væ... more Dette er et online særnummer. Værkfortegnelsen er ordnet alfabetisk efter første ord i titlen. Værker med tal som første ord i titlen er ordnet numerisk efter den alfabetiske del. Uidentificerede værker er anført alfabetisk til slut i katalogen.
Fund og Forskning i Det Kongelige Biblioteks Samlinger, 2014
Herman Bang’s reputation as one of our greatest impressionist fiction writers is now undisputed. ... more Herman Bang’s reputation as one of our greatest impressionist fiction writers is now undisputed. The assessment of his work as a playwright, on the other hand, is more complicated. This might seem surprising considering that Bang in particular, more than so many other writers, was a master at describing and “delineating” his fellow human beings by means of what they said and how they expressed themselves. Over the years Bang wrote a total of 14 plays and lesser theatrical works plus three translations of plays, all of which, with two exceptions, were performed at the leading Danish and Scandinavian theatres of the day, with a single work also being staged in Paris. None of these works was a conclusive success with either the public or the critics, however. The exception may be the recently discovered monologue entitled “Efter Ballet” (After the Ball), which Bang wrote in the summer of 1880. It represents one of his earliest public appearances as a playwright and was written for Bett...
Identity authentication sharing technology which allows many service providers to share the resul... more Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.
The representative risk evaluation techniques of the marine traffic environment are the FSA, PAWS... more The representative risk evaluation techniques of the marine traffic environment are the FSA, PAWSA, & IWRAP. For the development of these techniques, the risk factors suitable to the marine traffic environment should be selected & the assessment criterion of the risk factors should be provided. The risk factors were selected as the factors that relate both to the frequency of casualty & to the consequence of casualty because the risk was defined as the frequency of casualty times the consequence of that casualty on the existing techniques. But, the risk factors relate to the consequence of casualty are excluded because the risk is defined as the sum of the risk factors including the frequency and the consequence by factors on this study. The 20 kinds of risk factors to compose the risk are selected and classified into 5 categories according to similar nature through the analysis of preceding study on the classification of the risk factors. Finally, as the foundation of risk assessment model's development for domestic marine traffic environment, the practical assessment criterion of the risk factors are suggested.
In this paper, we deal with the problem of scheduling parallel tasks with deadlines. Parallel tas... more In this paper, we deal with the problem of scheduling parallel tasks with deadlines. Parallel tasks can be simultaneously executed on various machines and specially, we consider the malleable tasks, that is, the tasks whose execution time is given by a function of the number of machines on which they are executed. The goal of the problem is to maximize the throughput of tasks completed within their deadlines. This problem is well-known as NP-hard problem. Thus we will find an approximation algorithm, and its performance is compared with that of the optimal algorithm and analyzed by finding the approximation ratio. In particular, the algorithm has more resources, that is, more machines, than the optimal algorithm. This is called the resource augmentation analysis. We propose an algorithm to guarantee the approximation ratio of 3.67 using 1.5 times machines.
Users may download and print one copy of any publication from the public portal for the purpose... more Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
Ce document est protégé par la loi sur le droit d'auteur. L'utilisation des services d'Érudit (y ... more Ce document est protégé par la loi sur le droit d'auteur. L'utilisation des services d'Érudit (y compris la reproduction) est assujettie à sa politique d'utilisation que vous pouvez consulter en ligne. [https://apropos.erudit.org/fr/usagers/politiquedutilisation/] Cet article est diffusé et préservé par Érudit.
Fund og Forskning i Det Kongelige Biblioteks Samlinger
Dette er et online særnummer. Værkfortegnelsen er ordnet alfabetisk efter første ord i titlen. Væ... more Dette er et online særnummer. Værkfortegnelsen er ordnet alfabetisk efter første ord i titlen. Værker med tal som første ord i titlen er ordnet numerisk efter den alfabetiske del. Uidentificerede værker er anført alfabetisk til slut i katalogen.
Fund og Forskning i Det Kongelige Biblioteks Samlinger, 2014
Herman Bang’s reputation as one of our greatest impressionist fiction writers is now undisputed. ... more Herman Bang’s reputation as one of our greatest impressionist fiction writers is now undisputed. The assessment of his work as a playwright, on the other hand, is more complicated. This might seem surprising considering that Bang in particular, more than so many other writers, was a master at describing and “delineating” his fellow human beings by means of what they said and how they expressed themselves. Over the years Bang wrote a total of 14 plays and lesser theatrical works plus three translations of plays, all of which, with two exceptions, were performed at the leading Danish and Scandinavian theatres of the day, with a single work also being staged in Paris. None of these works was a conclusive success with either the public or the critics, however. The exception may be the recently discovered monologue entitled “Efter Ballet” (After the Ball), which Bang wrote in the summer of 1880. It represents one of his earliest public appearances as a playwright and was written for Bett...
Identity authentication sharing technology which allows many service providers to share the resul... more Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.
The representative risk evaluation techniques of the marine traffic environment are the FSA, PAWS... more The representative risk evaluation techniques of the marine traffic environment are the FSA, PAWSA, & IWRAP. For the development of these techniques, the risk factors suitable to the marine traffic environment should be selected & the assessment criterion of the risk factors should be provided. The risk factors were selected as the factors that relate both to the frequency of casualty & to the consequence of casualty because the risk was defined as the frequency of casualty times the consequence of that casualty on the existing techniques. But, the risk factors relate to the consequence of casualty are excluded because the risk is defined as the sum of the risk factors including the frequency and the consequence by factors on this study. The 20 kinds of risk factors to compose the risk are selected and classified into 5 categories according to similar nature through the analysis of preceding study on the classification of the risk factors. Finally, as the foundation of risk assessment model's development for domestic marine traffic environment, the practical assessment criterion of the risk factors are suggested.
In this paper, we deal with the problem of scheduling parallel tasks with deadlines. Parallel tas... more In this paper, we deal with the problem of scheduling parallel tasks with deadlines. Parallel tasks can be simultaneously executed on various machines and specially, we consider the malleable tasks, that is, the tasks whose execution time is given by a function of the number of machines on which they are executed. The goal of the problem is to maximize the throughput of tasks completed within their deadlines. This problem is well-known as NP-hard problem. Thus we will find an approximation algorithm, and its performance is compared with that of the optimal algorithm and analyzed by finding the approximation ratio. In particular, the algorithm has more resources, that is, more machines, than the optimal algorithm. This is called the resource augmentation analysis. We propose an algorithm to guarantee the approximation ratio of 3.67 using 1.5 times machines.
Users may download and print one copy of any publication from the public portal for the purpose... more Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
Ce document est protégé par la loi sur le droit d'auteur. L'utilisation des services d'Érudit (y ... more Ce document est protégé par la loi sur le droit d'auteur. L'utilisation des services d'Érudit (y compris la reproduction) est assujettie à sa politique d'utilisation que vous pouvez consulter en ligne. [https://apropos.erudit.org/fr/usagers/politiquedutilisation/] Cet article est diffusé et préservé par Érudit.
Uploads
Papers by Knud Jürgensen