نتایج جستجو برای: e identity
تعداد نتایج: 1127292 فیلتر نتایج به سال:
An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems—authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key issues to be addressed in the...
In 1973/74 Bennett and (independently) Carl proved that for 1 ≤ u ≤ 2 the identity map id: `u ↪→ `2 is absolutely (u, 1)-summing, i. e., for every unconditionally summable sequence (xn) in `u the scalar sequence (‖xn‖`2 ) is contained in `u, which improved upon well-known results of Littlewood and Orlicz. The following substantial extension is our main result: For a 2-concave symmetric Banach s...
Many recent management programmes have sought to establish organisation-wide collaborations that connect people in different functional and occupation groups (Blackler, Crump, & McDonald, 2000). Typically, these programmes are made possible through the deployment and use of e-collaboration technologies such as groupware, workflow systems, intranets, extranets, and the internet (Ciborra, 1996; H...
Dissemination of epithelial cells is a critical step in metastatic spread. Molecular models of dissemination focus on loss of E-cadherin or repression of cell adhesion through an epithelial to mesenchymal transition (EMT). We sought to define the minimum molecular events necessary to induce dissemination of cells out of primary murine mammary epithelium. Deletion of E-cadherin disrupted epithel...
E-learning environments and their system functionalities resemble one another to a large extent. Recent standardization efforts in e-learning concentrate on the reuse of learning material, but not on the reuse of application or system functionalities. The LearnServe system under development at the University of Muenster builds on the assumption that a typical learning system is a collection of ...
In this article, the authors examine the conceptualization and measurement of ethnic identity as a multidimensional, dynamic construct that develops over time through a process of exploration and commitment. The authors discuss the components of ethnic identity that have been studied and the theoretical background for a developmental model of ethnic identity. The authors review research on the ...
As computer-mediated communication (CMC) is becoming more mainstream in higher education (HE), the issue of social interaction online and its impact on learning has been raised. CMC theorists have argued that shared group identity produces the online social presence necessary for successful interaction but that other identities may be inhibiting. Meanwhile, advocates of the liberating potential...
An identity-based anonymous agent privacy protection scheme is proposed to deal with the problems of privacy information disclosure. In this paper, some analysis about the status quo of the privacy protection research in China and some partitioning of privacy data in ecommerce are given. We further illuminate the whole process of privacy protection by an ecommerce privacy protection scheme base...
after the soviet union dissolution, a chaotic period was begun in the russia. russia lost its glory and felt disgrace. the first group of elites came to power under yeltsin; they tried to re-define russia’s identity as a european country and build a foreign policy on this baseline. therefore russia tried to become closer with the west especially with the u.s. according to their view the sovie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید