نتایج جستجو برای: and third party damage index tpdi
تعداد نتایج: 16913533 فیلتر نتایج به سال:
This paper presents applications for the weak protection of secrets in which weakness is not just acceptable but desirable. For one application, two versions of a lottery scheme are presented in which the result of the lottery is determined by the ticket numbers purchased, but no one can control the outcome or determine what it is until after the lottery closes. This is because the outcome is k...
BACKGROUND Ageing of Mexican population implies greater demand of hospital services. Nevertheless, the available resources are used inadequately. In this study, the direct medical costs associated with the appropriateness of elderly populations hospital stay are estimated. METHODS Appropriateness of hospital stay was evaluated with the Appropriateness Evaluation Protocol (AEP). Direct medical...
To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that al...
In this paper, we propose a new electronic voting scheme which guarantees receipt-freeness as well as privacy, universal veriiability and robustness. The result of Cramer, Gennaro, and SchoenmarkerssCGS97] proposed at Eurocrypt'97 seems to be promising because it provides optimal performance , privacy, robustness, and universal veriiability. But in their scheme, receipt-freeness was left as an ...
We present a protocol developed by the ASPeCT project for secure billing that provides the incontestable charging that is required for UMTS. This protocol realises a payment system for value added services. We describe the protocol and in particular the design features that are of particular relevance to the UMTS environment. We also describe the configuration of a field trial of this protocol ...
Adopting concepts from statistical language modeling and rulebased transformations can lead to effective and efficient text-tophone (TTP) functions. We present here the methods and results of one such effort, resulting in a relatively compact and fast set of TTP rules that achieves 94.5% segmental phonemic accuracy.
We present a technique to identify Twitter users we trust to be regular Twitter users and not spam or fake accounts. The technique starts with an initial set of trusted users based on Twitter’s verified users and recursively includes other users the trusted users communicate with. Conversations must be initiated by trusted users. We show that this technique produces a set of users that is over ...
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two different protocols, discuss and improve their efficiency and generalise the type of key...
We present a new methodology that permits to reuse an existing hardware component that has not been developed within the B framework while maintaining a correct design flow. It consists of writing a specification of the component in B and proving that the VHDL description of the component implements the specification using the ACL2 system. This paper focuses on the translation of the B specific...
Your practice is vulnerable to business-related liabilities including billing errors and omissions, discrimination, and wrongful termination. ■ NORCAL’s Physicians Administrative Defense (PAD) coverage helps you defend against these claims whether filed by government agencies, regulatory boards or third-party payers. PAD also provides for practice interruption and legal consultation. ■ Focus on...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید