نتایج جستجو برای: discussion section

تعداد نتایج: 340432  

2012
Jeremy Butterfield

I discuss how modern cosmology illustrates under-determination of theoretical hypotheses by data, in ways that are different from most philosophical discussions. I emphasize cosmology’s concern with what data could in principle be collected by a single observer (Section 2); and I give a broadly sceptical discussion of cosmology’s appeal to the cosmological principle as a way of breaking the und...

Journal: :Methods of information in medicine 2015
S Denaxas C P Friedman A Geissbuhler H Hemingway D Kalra M Kimura K A Kuhn T H Payne F G B de Quiros J C Wyatt

This article is part of a For-Discussion-Section of Methods of Information in Medicine about the paper "Combining Health Data Uses to Ignite Health System Learning" written by John D. Ainsworth and Iain E. Buchan [1]. It is introduced by an editorial. This article contains the combined commentaries invited to independently comment on the paper of Ainsworth and Buchan. In subsequent issues the d...

Journal: :Methods of information in medicine 2015
N Al-Shorbaji L Hanmer R Hussein F Magrabi A Moen L A Moura H-A Park P Scott

This article is part of a For-Discussion-Section of Methods of Information in Medicine about the paper "Evidence-based Health Informatics: How Do We Know What We Know?" written by Elske Ammenwerth [1]. It is introduced by an editorial. This article contains the combined commentaries invited to independently comment on the Ammenwerth paper. In subsequent issues the discussion can continue throug...

Journal: :Softw., Pract. Exper. 1981
Paul Klint

Two major subjects are covered in this paper. Section 2 contains a discussion of the relative merits of compilation and interpretation as implementation methods for high level languages. Issues like efficiency, flexibility, error detection and portability are treated. Section 3 contains a detailed description of three common interpretation techniques. Some measurements of the time and space req...

2017
Tim Oliver Michael Williams

................................................................................................................................................. 1 BACKGROUND & INTRODUCTION ............................................................................................... 2 LITERATURE REVIEW ..............................................................................................................

Journal: :Journal of consulting and clinical psychology 1998
P C Kendall

This article introduces the special section of the Journal of Consulting and Clinical Psychology on empirically supported psychological therapies. After a discussion of the rationale for the selection of the specific terms in the label, several justifications are considered for conducting and learning from empirical evaluations of psychological therapies. Finally, the process that guided the sp...

2013
Edgard Novaes França Bisneto

This article, presented in three sections, review the most common upper limb malformations and their treatments. In this section two there’s a discussion about failure of formation and duplication of the parts. The bibliography is continuous since section one. © 2013 Sociedade Brasileira de Ortopedia e Traumatologia. Published by Elsevier Editora Ltda. All rights reserved. 4 Rev Bras Ortop. 201...

2006
Samer Kharroubi Christopher McCabe

Disclaimer: This is a Discussion Paper produced and published by the Health Economics and Decision Science (HEDS) Section at the School of Health and Related Research (ScHARR), University of Sheffield. HEDS Discussion Papers are intended to provide information and encourage discussion on a topic in advance of formal publication. They represent only the views of the authors, and do not necessari...

2006
Michael Stausholm

In this paper we give a short overview of the security of the Global System of Mobile Communications (GSM) system in light of a recent attack by Barkan et al. on one of the cryptographic algorithms used for both privacy protection and authentication. The attack breaks the algorithm in a very practical way and, as we will see, a design flaw in the GSM authentication protocol allow an attacker to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید