نتایج جستجو برای: creation account

تعداد نتایج: 392097  

Journal: : 2021

Examples from printed periodicals clarify the tendencies of activation complex occasional adjectives in press, outline specifics composite adjectives-occasionalisms, which have lexical and semantic features use, patterns creation explain their meaning. The article provides a brief analysis research by domestic linguists on functioning Ukrainian language. structural innovative are clarified taki...

2008
Stephen Lynn David W. Embley

Ontology creation is a daunting task—manual creation is tedious and time consuming, and automatic creation is disappointingly inaccurate. But for applications such as the semantic web or making web content directly queriable, we must facilitate ontology creation, making it reasonable to produce the vast number and variety of ontologies required for future web applications. In this paper we desc...

1999
I. S. Booth R. B. Mann

We investigate the general process of black hole pair creation in a cosmological background, considering the creation of charged and rotating black holes. We motivate the use of Kerr-Newmann-deSitter solutions to investigate this process, showing how they arise from more general C-metric type solutions that describe a pair of general black holes accelerating away from each other in a cosmologic...

1983
I S Booth R B Mann

We investigate the general process of black hole pair creation in a cosmological background , considering the creation of charged and rotating black holes. We motivate the use of Kerr-Newmann-deSitter solutions to investigate this process, showing how they arise from more general C-metric type solutions that describe a pair of general black holes accelerating away from each other in a cosmologi...

2011

BEA economist looks at sumers essentially separate tion strategies at an airline, the airline price strategies themselves through the ticket authors developed a simple the-The role of pricing strategies, choices that they make. This oretical model of second-degree which can have a profound im­ type of self selection is referred price discrimination and applied pact on companies' profitability, ...

Journal: :Medical History 1985
Lise Wilkinson

be "comprehensively followed from the official reports". Fortunately, official publications and actual events at local level frequently show interesting discrepancies and nineteenth-century provincial newspapers are full of detailed and useful accounts of the epidemic that certainly deserve setting alongside these official records. Pattison clearly has veterinary heroes and villains, not all of...

2015
Walter S. Lasecki Mitchell Gordon Jaime Teevan Ece Kamar Jeffrey P. Bigham

It can be hard to automatically identify sensitive content in images or other media because significant context is often necessary to interpret noisy content and complex notions of sensitivity. Online crowds can help computers interpret information that cannot be understood algorithmically. However, systems that use this approach can unwittingly show workers information that should remain priva...

2010
Paul Hawking

A worldwide shortage of SAP related skills threatens the viability of many Enterprise Systems implementations limits the adoption of Enterprise Systems in developing countries. SAP, the leading Enterprise Systems vendor, has established its University Alliance Program (UAP) to help address these skill shortages. The SAP UAP provides the opportunity for universities to access SAP solutions and a...

2008
Juan Pablo Medina Anella Munro Claudio Soto

Current Account and External Financing, edited by Kevin Cowan, Sebastián Edwards, and Rodrigo O. Valdés, Santiago, Chile. © 2008 Central Bank of Chile. We thank Juan Echavarría, Nicolás Eyzaguirre, and Miguel Fuentes for useful comments; Kevin Cowan, Sebastián Edwards, and Rodrigo O. Valdés for proposing improvements in the current version; and Pamela Jervis for research assistance. The paper w...

2017
Y. Tang P. P. C. Lee J. C. S. Lui

Presently technical and legal landscape presents formidable challenges in data privacy. The personal data's like password, account number and any other important information's are cached, copied and achieved by the service providers. destroying of data mainly aims at providing data privacy. The data is deleted after the specified time i. e. , the decryption key is deleted so that afte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید