نتایج جستجو برای: abac

تعداد نتایج: 142  

Journal: :Applied sciences 2023

Organisations are adopting new IT strategies such as “Bring Your Own Device” (BYOD) and remote working. These trends highly beneficial both for enterprise owners employees in terms of increased productivity reduced costs. However, security issues unauthorised access well privacy concerns pose significant obstacles. can be overcome by control techniques a dynamic policy that governs these where ...

Journal: :Mineralogical Magazine 2023

Abstract Bystrite is redefined as a four-layer cancrinite-group mineral with the Losod-type framework and end-member formula Na 7 Ca(Al 6 Si O 24 )S 5 2– Cl – . The known only at Malo–Bystrinskoe gem lazurite deposit, Baikal Lake area, Siberia, Russia. associated minerals are calcite, lazurite, sodalite, fluorapatite, phlogopite, diopside, dolomite plagioclase. brittle, Mohs hardness of distinc...

2006
J. Kimball

This paper reviews the international economic and financial situation currently and compares it to the 1990's and concludes that conditions are very different: it is unlikely that a crisis similar to those of the earlier period will occur now. Capital controls in the 1990s are examined in detail and two examples of the most highly regarded implementation of them – Chile and Malaysia – provide e...

2010
Ruan He

Advances in pervasive system are rapidly taking us to a novel frontier in security, revealing a whole new landscape of threats. In open and dynamic environments, malicious terminals may enter a network without being detected, and various malwares may invisibly install themselves on a device. While roaming between heterogeneous networks which are adjusted for their own protection requirements, a...

1998
Michael P Barnett

A prototype three center exchange integral over Slater orbitals is reduced to an in nite series A closed expression is given for the general term The generalization to the orbitals of arbitrary quantum number is outlined The derivations and the production of this paper were mechanized Introduction The evaluation of the full range of molecular integrals over Slater orbitals ETOs remains an unsol...

2012
Gabriel SARGENT Frédéric BIMBOT Emmanuel VINCENT

Music structure refers to the description of the long term organization of a music piece through a sequence of structural segments. A structural segment can be defined by its structural borders (a start time, an end time) and a label reflecting the similarity of its music content compared to the other segments’. Its duration is typically around 16 s and more. This document presents the music st...

2008
Mohammad Muzahid Akbar

This study intends to investigate the relationships of communication effectiveness, trust, technical quality, functional quality, and relationship commitment in the context of the prepaid and post-post subscribers of a major private telecommunication company of Bangladesh. It presents a critical appraisal of some important antecedents of subscribers’ relationship commitment to the respective mo...

Journal: :CoRR 2016
Yunpeng Zhang Xuqing Wu

Cheating is a real problem in the Internet of Things. The fundamental question that needs to be answered is how we can trust the validity of the data being generated in the first place. The problem, however, isnt inherent in whether or not to embrace the idea of an open platform and open-source software, but to establish a methodology to verify the trustworthiness and control any access. This p...

Journal: :Contemporary Accounting Research 2021

Although internal control over financial reporting has gained increasing regulatory attention, its enforcement is far from perfect; thus, firm-specific incentives to management become important increase the quality of reports. We study how owners can motivate managers invest in accounting even though it costly managers. Using an agency model, we establish that a sufficiently conservative system...

2008
Latifa Boursas Wolfgang Hommel

Traditionally, the risks associated with granting customers and their users access to services and resources are mitigated by contractual frameworks, such as service level agreements (SLAs). However, in large and highly dynamic federated environments, also external and previously unknown users must be handled in an automated manner, which limits the available options to negotiate SLAs. In this ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید