Preservation or access
نویسندگان
چکیده
منابع مشابه
Mutuality Preservation for Ubiquitous Resource Access
Complex networked systems provide access to a variety of resources. There are standard resources as well as nomadic ones. Local access suffices for some whereas others are far off requiring distant access. Of each resource type multiple instances are accessible greatly differing in characteristics. A scalability measure is used to evaluate the extent to which the system manages to effectively u...
متن کاملHelicobacter pylori: Eradication or Preservation
Helicobacter pylori infects about 50% of the world's population and inevitably results in the development of gastritis. Of those infected, about 10% develop peptic ulcer disease and roughly 1% develop gastric cancer. Conversely, some take the view that H. pylori infection provides some protection against gastro-esophageal reflux disease and possibly asthma. This review aims to explore the case ...
متن کاملUterine prolapse e preservation or excision?
Bp Ap tv l C D POP-Q (Pelvic Organ Prolapse Quantification System) Abstract The pathological cause of uterine prolapse is loss of integrity of the uterosacral and cardinal ligament complex and a weakening of the pelvic floor diaphragm. Uterine descent is a consequence rather than the cause of pelvic organ prolapse. However vaginal hysterectomy is an operation which is commonly performed to trea...
متن کاملPreservation and Forgetting: Friends or Foes?
Humans are very effective in remembering by abstraction, pattern exploitation, or contextualization. On the other hand, humans are also capable of forgetting irrelevant details, an important role in the human brain helping us to focus on relevant things instead of drowning in details by remembering everything. The research question that we address in this paper is: Can we learn from human remem...
متن کاملPrivacy Preservation in Role-based Access Control Model
Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ANZTLA EJournal
سال: 2019
ISSN: 1839-8758
DOI: 10.31046/anztla.v0i38.1418