نتایج جستجو برای: it

تعداد نتایج: 2839407  

Journal: :gastroenterology and hepatology from bed to bench 0
thea haldane department of gastroenterology, alexandra hospital, uk ishfaq ahmad department of gastroenterology, alexandra hospital, uk

0

Journal: :The Ulster Medical Journal 1990
AE Evans

influence this has on final height is not included in this chapter but found elsewhere under the heading of indices of maturity. In general it is well written, although it could be more concise. A helpful reference list is provided. After reading this text, I can only agree with the author's quotation of Saint Augustine "man looks about the universe in awe at its wonders and forgets that he him...

2010
Saed Imran Ioannis M. Dokas John Feehan Franclin S. Foping

Domain Specific Modeling (DSM) has been used for a while in many scenarios, case studies, and applications successfully. This paper intends to present a new application of DSM for facilitating an Early Warning Service (EWS). The knowledge about risks and its representation is an important factor for any EWS. The challenge is to help the users be closer to the understanding of the associated ris...

2013
Kim Weyns Martin Höst

This paper presents a practical risk analysis method for critical, large-scale IT systems in an organisation. The method is based on reliability block diagram modelling and was adapted to fit the requirements of governmental organisations and to reduce the effort required to capture complex failure behaviour. Through the use of different failure categories the risk analysis can be simplified, t...

Journal: :Computers in Human Behavior 2014
Anthony M. Limperos Daniel J. Tamul Julia K. Woolley John S. W. Spinda S. Shyam Sundar

This research seeks to understand how people perceive and respond to structural factors and different types of disclosure on Facebook when evaluating the profile of someone they have never met offline. Using a 2 3 2 between-subjects experimental design, this research explored the relationship between friend adding (add; no add), levels of self-disclosure (low, medium, high), and sex of the Face...

2010
Yoko Yamamoto Mary C. Brinton

Cultural capital has been an important but often elusive concept in the study of educational processes and social class reproduction. The authors suggest that this is partly because a country’s educational system and ways of evaluating students at different educational transitions set the context for the mechanisms through which embodied and objectified cultural capital operate. Moreover, paren...

2016
Daniel Baumgarten Michael Kvasnicka

We investigate with German data how the use of temporary agency work has helped establishments to manage the economic and financial crisis in 2008/09. We examine the (regular) workforce development, use of short-time work, and business performance of establishments that made differential use of temporary agency work prior to the crisis. Overall, our results suggest that establishments with a gr...

Journal: :CoRR 2009
John Hunt

This paper outlines an approach to manage and quantify the risks associated with changes made to spreadsheets. The methodology focuses on structural differences between spreadsheets and suggests a technique by which a risk analysis can be achieved in an automated environment. The paper offers an example that demonstrates how contiguous ranges of data can be mapped into a generic list of formula...

2017
Aleksandrs Marinins

....................................................................................................................... III Acknowledgements .................................................................................................... VII List of publications ...................................................................................................... IX Acronyms ..................

2005
Per Røe Jon Ølnes André Larsen Ilangko Balasingham Karl Øyri

This document describes given an analysis of the computer security aspects of the demonstrator developed in work package 12 of the Wireless Health and Care (WsHC) project. A risk analysis is performed and requirements for the system are established. The implementation of security measurements implemented in the demonstrator is discussed. Finally the risk analysis is revised according to the pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید