نتایج جستجو برای: and third party damage index tpdi

تعداد نتایج: 16913533  

1998
Paul F. Syverson

This paper presents applications for the weak protection of secrets in which weakness is not just acceptable but desirable. For one application, two versions of a lottery scheme are presented in which the result of the lottery is determined by the ticket numbers purchased, but no one can control the outcome or determine what it is until after the lottery closes. This is because the outcome is k...

Journal: :BMC Health Services Research 2009
Joaquín F Mould-Quevedo Carmen García-Peña Iris Contreras-Hernández Teresa Juárez-Cedillo Claudia Espinel-Bermúdez Gabriela Morales-Cisneros Sergio Sánchez-García

BACKGROUND Ageing of Mexican population implies greater demand of hospital services. Nevertheless, the available resources are used inadequately. In this study, the direct medical costs associated with the appropriateness of elderly populations hospital stay are estimated. METHODS Appropriateness of hospital stay was evaluated with the Appropriateness Evaluation Protocol (AEP). Direct medical...

2007
Chakib Bekara Maryline Laurent-Maknavicius Kheira Dari Bekara

To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that al...

2000
Byoungcheon Lee Kwangjo Kim

In this paper, we propose a new electronic voting scheme which guarantees receipt-freeness as well as privacy, universal veriiability and robustness. The result of Cramer, Gennaro, and SchoenmarkerssCGS97] proposed at Eurocrypt'97 seems to be promising because it provides optimal performance , privacy, robustness, and universal veriiability. But in their scheme, receipt-freeness was left as an ...

1998
G. Horn P. Howard K. M. Martin C. J. Mitchell B. Preneel K. Rantos

We present a protocol developed by the ASPeCT project for secure billing that provides the incontestable charging that is required for UMTS. This protocol realises a payment system for value added services. We describe the protocol and in particular the design features that are of particular relevance to the UMTS environment. We also describe the configuration of a field trial of this protocol ...

1999
William M. Fisher

Adopting concepts from statistical language modeling and rulebased transformations can lead to effective and efficient text-tophone (TTP) functions. We present here the methods and results of one such effort, resulting in a relatively compact and fast set of TTP rules that achieves 94.5% segmental phonemic accuracy.

2014
Martin Hentschel Omar Alonso Scott Counts Vasileios Kandylas

We present a technique to identify Twitter users we trust to be regular Twitter users and not spam or fake accounts. The technique starts with an initial set of trusted users based on Twitter’s verified users and recursively includes other users the trusted users communicate with. Conversations must be initiated by trusted users. We show that this technique produces a set of users that is over ...

1997
Keith M. Martin

This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two different protocols, discuss and improve their efficiency and generalise the type of key...

2005
Yann Zimmermann Diana Toma

We present a new methodology that permits to reuse an existing hardware component that has not been developed within the B framework while maintaining a correct design flow. It consists of writing a specification of the component in B and proving that the VHDL description of the component implements the specification using the ACL2 system. This paper focuses on the translation of the B specific...

Journal: :Medicine and health, Rhode Island 2001
J H Friedman

Your practice is vulnerable to business-related liabilities including billing errors and omissions, discrimination, and wrongful termination. ■ NORCAL’s Physicians Administrative Defense (PAD) coverage helps you defend against these claims whether filed by government agencies, regulatory boards or third-party payers. PAD also provides for practice interruption and legal consultation. ■ Focus on...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید