Management Method

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 836703 Experts worldwide ranked by ideXlab platform

Yutaka Ohsawa - One of the best experts on this subject based on the ideXlab platform.

  • A spatiotemporal data Management Method using inverse differential script
    Lecture Notes in Computer Science, 1999
    Co-Authors: Yutaka Ohsawa
    Abstract:

    According to popularization of the geographic information system (GIS), temporal data Management has become very important. When GIS is used in daily work, the most frequently accessed data is the present data. Therefore, the access speed for the present data should not be lowered in spatiotemporal data Management. Furthermore, the past data should also be able to be restored. This paper proposes a spatiotemporal data Management Method based on the geographic differential script file (GDSF) Method. This Method records changes in maps in the form of a graphical operation with a time print. When old data becomes necessary, the data is restored by applying the GDSF to the current map data. This paper describes a combination Method of spatial data structure and the GDSF for expediting the excution of spatial retrieval.

  • ER Workshops - A Spatiotemporal Data Management Method Using Inverse Differential Script
    Advances in Database Technologies, 1998
    Co-Authors: Yutaka Ohsawa
    Abstract:

    According to popularization of the geographic information system (GIS), temporal data Management has become very important. When GIS is used in daily work, the most frequently accessed data is the present data. Therefore, the access speed for the present data should not be lowered in spatiotemporal data Management. Furthermore, the past data should also be able to be restored. This paper proposes a spatiotemporal data Management Method based on the geographic differential script file (GDSF) Method. This Method records changes in maps in the form of a graphical operation with a time print. When old data becomes necessary, the data is restored by applying the GDSF to the current map data. This paper describes a combination Method of spatial data structure and the GDSF for expediting the excution of spatial retrieval.

Wang Lei - One of the best experts on this subject based on the ideXlab platform.

  • smartphone multi user mode permission Management Method and smartphone multi user mode permission Management system
    2013
    Co-Authors: Yuan Cangzhou, Guo Fei, Wang Lei
    Abstract:

    The invention discloses a smartphone multi-user mode permission Management Method. According to the smartphone multi-user mode permission Management Method, firstly, user permissions are set in four levels, and operation permissions of users in each level are set; then unlocking codes, smartphone application and resource access permissions are set for the users in all the levels; and therefore set accessible smartphone applications and set accessible smartphone resources of the users in all the levels are displayed. The smartphone multi-user mode permission Management Method can also be used for providing three switching Methods for switching among the users in all the levels according to a current using state of a smartphone, and when a user in a low permission level is converted to a user in a high permission level, permission validation is needed. The invention further discloses a smartphone multi-user mode permission Management system, and the smartphone multi-user mode permission Management can be realized through a modular design. The smartphone multi-user mode permission Management Method and the smartphone multi-user mode permission Management system have the advantage that due to the fact that the using permissions of the different users are set, the purpose of protecting sensitive information in the smartphone is achieved, and swift switching of the user permissions can also be achieved.

Yuan Cangzhou - One of the best experts on this subject based on the ideXlab platform.

  • smartphone multi user mode permission Management Method and smartphone multi user mode permission Management system
    2013
    Co-Authors: Yuan Cangzhou, Guo Fei, Wang Lei
    Abstract:

    The invention discloses a smartphone multi-user mode permission Management Method. According to the smartphone multi-user mode permission Management Method, firstly, user permissions are set in four levels, and operation permissions of users in each level are set; then unlocking codes, smartphone application and resource access permissions are set for the users in all the levels; and therefore set accessible smartphone applications and set accessible smartphone resources of the users in all the levels are displayed. The smartphone multi-user mode permission Management Method can also be used for providing three switching Methods for switching among the users in all the levels according to a current using state of a smartphone, and when a user in a low permission level is converted to a user in a high permission level, permission validation is needed. The invention further discloses a smartphone multi-user mode permission Management system, and the smartphone multi-user mode permission Management can be realized through a modular design. The smartphone multi-user mode permission Management Method and the smartphone multi-user mode permission Management system have the advantage that due to the fact that the using permissions of the different users are set, the purpose of protecting sensitive information in the smartphone is achieved, and swift switching of the user permissions can also be achieved.

Guo Fei - One of the best experts on this subject based on the ideXlab platform.

  • smartphone multi user mode permission Management Method and smartphone multi user mode permission Management system
    2013
    Co-Authors: Yuan Cangzhou, Guo Fei, Wang Lei
    Abstract:

    The invention discloses a smartphone multi-user mode permission Management Method. According to the smartphone multi-user mode permission Management Method, firstly, user permissions are set in four levels, and operation permissions of users in each level are set; then unlocking codes, smartphone application and resource access permissions are set for the users in all the levels; and therefore set accessible smartphone applications and set accessible smartphone resources of the users in all the levels are displayed. The smartphone multi-user mode permission Management Method can also be used for providing three switching Methods for switching among the users in all the levels according to a current using state of a smartphone, and when a user in a low permission level is converted to a user in a high permission level, permission validation is needed. The invention further discloses a smartphone multi-user mode permission Management system, and the smartphone multi-user mode permission Management can be realized through a modular design. The smartphone multi-user mode permission Management Method and the smartphone multi-user mode permission Management system have the advantage that due to the fact that the using permissions of the different users are set, the purpose of protecting sensitive information in the smartphone is achieved, and swift switching of the user permissions can also be achieved.

Roger G Schroeder - One of the best experts on this subject based on the ideXlab platform.

  • a theory of quality Management underlying the deming Management Method
    Academy of Management Review, 1994
    Co-Authors: John C Anderson, Manus Rungtusanatham, Roger G Schroeder
    Abstract:

    In its current form, the Deming Management Method contains a prescriptive set of 14 points that serve as guidelines for appropriate organizational behavior and practice regarding quality Management. Despite the apparent effect of these 14 points on both the industrial world and the practice of Management theory around the world, there is little evidence of the role of the Deming Management Method in the formalization and advancement of Management theory. Although its impact on Management practice is clear, neither its theoretical contribution nor its theoretical base has yet to be articulated. Yes, there is a theory of quality Management underlying the Deming Management Method, but at present, this theory is presented in the prescriptive form of these 14 points. We propose and articulate a theory of quality Management to describe and explain the effects of adopting the Deming Management Method. This theory is based on the conceptual synthesis of Deming's writings, literature on the Deming Management metho...