نتایج جستجو برای: and third party damage index tpdi
تعداد نتایج: 16913533 فیلتر نتایج به سال:
Children as young as two years of age are able to learn novel object labels through overhearing, even when distracted by an attractive toy (Akhtar, 2005). The present studies varied the information provided about novel objects and examined which elements (i.e. novel versus neutral information and labels versus facts) toddlers chose to monitor, and what type of information they were more likely ...
Developing software systems that are composed in total or in part from software components over which the developer has little control presents difficulties not yet addressed by componentbased software engineering research. Among the problems associated with such component-based development is the potential for a component developer to misrepresent the quality of components. It is therefore par...
The use of Data Envelopment Analysis (DEA) in many fields is based on total flexibility of the weights. However, the problem of allowing total flexibility of the weights is that the values of the weights obtained by solving the unrestricted DEA program are often in contradiction to prior views or additional available information. Also, many applications of DEA assume complete discretionary of d...
The success and failure of software projects are based on performance indicators such as: compliance to the customer first requirements, customer satisfaction, software quality, budget overrun, schedule compliance and so on. Certainly, project management approaches and best practices known in the field of software engineering or others have been used in software maintenance (SM) management to b...
Integrity critical databases, such as financial information, which are used in high-value decisions, are frequently published over the internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of end clients. Providing this protection over public data networks is an expensive proposition. This is, in part, due to the difficulty of building and ...
Over the past few years, as part of the Oak Ridge Leadership Class Facility project (OLCF-3), Oak Ridge National Laboratory (ORNL) has been engaged with several third party tools vendors with the aim of enhancing the tool offerings for ORNLs GPU-based platform, Titan. This effort has resulted in enhancements to CAPS’ HMPP compiler, Allinea’s DDT debugger, and the Vampir suite of performance ana...
Introduction: Penetration injury to the neck constitutes 5–10% of all trauma cases. Penetration of a foreign body into the trachea with subsequent impaction into the tracheoesophageal party wall is extremely rare. We present a patient with an unusual penetrating injury of the neck caused by a metallic foreign body embedded into the tracheoesophageal party wall, and its management. Case Repor...
Existing centralized identification systems, such as Facebook or Google, offer convenient services for authentication and storing user information that third-party services leverage to reduce friction and streamline the process of creating user profiles and logging in. However, these systems present conflict of interests, and users may be interested in a third-party service that focuses exclusi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید