نتایج جستجو برای: vulnerability

تعداد نتایج: 42681  

2016
Yang Gao

In order to deal with the huge threat and loss caused by the earthquake, established the evaluation system and model, and the risk zoning map is drawn according to the study of the vulnerability of Xicheng District's streets. According to the spatial coupling relationship between social vulnerability and physical vulnerability, drawn the comprehensive risk zoning map of Shichahai street as a ty...

Journal: :Circulation research 1955
B F HOFFMAN A A SIEBENS P F CRANEFIELD C M BROOKS

The effectiveness of 1-epinephrine and 1-norepinephrine in enhancing ventricular vulnerability has l)een compared in twelve dogs by obtaining fibrillation thresholds for single test stimuli. Both agents produce similar increases in vulnerability immediately following injection, and similar decreases in vulnerability at longer intervals following drug administration. These changes in vulnerabili...

Journal: :Entropy 2017
Zhengwei Pan Juliang Jin Chunhui Li Shaowei Ning Rongxing Zhou

This paper establishes a water resources vulnerability framework based on sensitivity, natural resilience and artificial adaptation, through the analyses of the four states of the water system and its accompanying transformation processes. Furthermore, it proposes an analysis method for water resources vulnerability based on connection entropy, which extends the concept of contact entropy. An e...

2002

We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m,n) access structures for threshold sharing schemes. Our protocol enables the addition or removal of shareholders and also guards against mobile adversaries that cause permanent damage. We observe that existing protocols either cannot be readily extended to allow redistribution between different access struct...

Journal: :Information Economics and Policy 2010
Ashish Arora Chris Forman Anand Nandkumar Rahul Telang

0167-6245/$ see front matter 2009 Elsevier B.V doi:10.1016/j.infoecopol.2009.10.002 * Corresponding author. E-mail addresses: [email protected] (A [email protected] (C. Forman), anand_nandkum kumar), [email protected] (R. Telang). We empirically estimate the effect of competition on vendor patching of software defects by exploiting variation in number of vendors that share a common fl...

2007
Stefan Popoveniuc Jonathan Stanton

Highly secure and auditable voting systems have been developed recently that open up the possibility of not only voting systems that claim to be secure, but ones that can actually be verified as secure and audited to the satisfaction of third party observers. Yet, these systems are still in development and do not yet handle all of the cases that arise in real-world elections. This extended abst...

2006
Jean-Yves Duclos Abdelkrim Araar John Giles

The paper contributes to the measurement of poverty and vulnerability in three ways. First, we propose a new approach to separating poverty into chronic and transient components. Second, we provide corrections for the statistical biases introduced when using a small number of periods to estimate the importance of vulnerability and transient poverty. Third, we apply these tools to the measuremen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید