نتایج جستجو برای: مدل breach

تعداد نتایج: 124667  

2009

As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensitive value of a targeted victim belongs to a set of semantically proximate values, even though not sure about the exact value. Focusing on tackling proximity breach under specific data models (e.g., categorical or nume...

2000
Hanoch Dagan

This article focuses on cases of restitution within contract, investigating the normative desirability of enabling a promisee to pursue the profits derived by the promisor through a breach of contract as an alternative pecuniary remedy of wide applicability. Situated at the frontier of both contractual and restitutionary liability, the question of whether restitutionary damages for breach of co...

2014
Chang-Hyun Lee Seung-Jae Hyun Yongjung J Kim Ki-Jeong Kim Tae-Ahn Jahng Hyun-Jib Kim

STUDY DESIGN A retrospective cross-sectional study. PURPOSE The purpose of this study is to evaluate the accuracy and safety of free-hand pedicle screw insertion performed by a young surgeon. OVERVIEW OF LITERATURE Few articles exist regarding the safety of the free-hand technique without inspection by an experienced spine surgeon. METHODS The index surgeon has performed spinal surgery fo...

ژورنال: مدیریت شهری 2017
Aliakbari Sefiddarbon, Aboozar , Soltan Ahmadi, Jalal , Taqizadeh, Ibrahim ,

The conclusion of any contract aims at implementation of the obligations arising from it. Morality dictates that people adhere to what they assumed regarding others. The law also supported the moral judgment and in case of breach of obligations to oblige, compensation as a sanction is imposed on obligor. In view of the economic analysis, he also committed to respect his contract and the Contrac...

2014
Sang-Uk Kim Byoung-il Roh Seong-Joon Kim Sang-Don Kim

OBJECTIVE To identify the accuracy and efficiency of the computed tomographic (CT)-based navigation system on upper cervical instrumentation, particularly C1 lateral mass and C2 pedicle screw fixation compared to previous reports. METHODS Between May 2005 and March 2014, 25 patients underwent upper cervical instrumentation via a CT-based navigation system. Seven patients were excluded, while ...

Journal: :CoRR 2017
Aditya Gune

Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores mo...

Journal: :Journal of abnormal psychology 1980
J F Kihlstrom F J Evans E C Orne M T Orne

Traditionally, posthypnotic amnesia has been construed as a subjectively compelling deficit in memory retrieval. Alternatively, it may represent a motivated failure to utilize appropriate retrieval cues, lack of effort in recall, active suppression of memory, or unwillingness to verbalize the critical material. In an effort to test the alternative hypothesis of amnesia, 488 subjects were presen...

2015
Brant M Webster C Patrick Lusk

The endosomal sorting complexes required for transport (ESCRT) are best known for their role in sorting ubiquitylated membrane proteins into endosomes. The most ancient component of the ESCRT machinery is ESCRT-III, which is capable of oligomerizing into a helical filament that drives the invagination and scission of membranes aided by the AAA ATPase, Vps4, in several additional subcellular con...

2014
William F. Lavelle Ashish Ranade Amer F. Samdani John P. Gaughan Linda P. D'Andrea Randal R. Betz

BACKGROUND Pedicle screws are used increasingly in spine surgery. Concerns of complications associated with screw breach necessitates accurate pedicle screw placement. Postoperative CT imaging helps to detect screw malposition and assess its severity. However, accuracy is dependent on the reading of the CT scans. Inter- and intra-observer variability could affect the reliability of CT scans to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید