نتایج جستجو برای: and third party damage index tpdi
تعداد نتایج: 16913533 فیلتر نتایج به سال:
This paper presents and solves a model of ethnically motivated warfare which treats annexations as the explicit outcomes secessions. An ethnic group within one country may want to engage in secession order join its peers annexing country. The decides whether or not support separatist conflict. I use this discuss how equilibrium behavior depends on economies scale public good provision, heteroge...
this paper develops a closed-loop supply chain including one manufacturer, one retailer and a third party, in which the manufacturer produces a product under appropriate quality and sells it through a retailer in the market. the retailer pays the expense of marketing effort and a third party collects the used products from consumers and sends to the manufacturer. the manufacturer remanufactures...
abstract: mineral scaling in oil and gas production equipment is one of the most important problem that occurs while water injection and it has been recognized to be a major operational problem. the incompatibility between injected and formation waters may result in inorganic scale precipitation in the equipment and reservoir and then reduction of oil production rate and water injection rate. ...
the protest of a third party generally involves three categories of actions: tierce opposition; third party's declaration; and third person's protest such as mentioned in fifth section of civil judgment enforcement act. therefore, there are some differences between third party's opposition to a judgment and third person's protest to enforcement proceedings in regard of conce...
Contract signing is a practical application of the fair exchange of digital signatures. This application used to be realized by directly adopting the results of the fair exchange of signatures, which do not completely meet the requirements of the signing of a secret contract. The assistance of a trusted third party (TTP) and some cryptographic technology are required to allow two parties to exc...
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to protect the sensitive information present in the database. The synthetic database and workload can be used by a third party to accurately carry out performance tuning, index selection, or other system evaluation tasks. ...
Patients are notoriously inconsistent with taking their medications. Doctors and insurance companies have an incentive to monitor and collect data on whether medical patients and insurance customers are following prescriptions and maintaining a healthy lifestyle. A convenient way of gathering such data is using smartphones. For example, accelerometer readings can be used to reveal how physicall...
The main goal of the work presented here is to allow for the broader dissemination of intelligent tutoring technology. To accomplish this goal, we have two clear objectives. First, we want to allow different types of people to author model-tracing intelligent tutoring systems (ITSs) than can now do so. Second, we want to enable an author to create a tutor for software that was not initially des...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید