نتایج جستجو برای: مدل breach gui
تعداد نتایج: 129795 فیلتر نتایج به سال:
This article focuses on cases of restitution within contract, investigating the normative desirability of enabling a promisee to pursue the profits derived by the promisor through a breach of contract as an alternative pecuniary remedy of wide applicability. Situated at the frontier of both contractual and restitutionary liability, the question of whether restitutionary damages for breach of co...
STUDY DESIGN A retrospective cross-sectional study. PURPOSE The purpose of this study is to evaluate the accuracy and safety of free-hand pedicle screw insertion performed by a young surgeon. OVERVIEW OF LITERATURE Few articles exist regarding the safety of the free-hand technique without inspection by an experienced spine surgeon. METHODS The index surgeon has performed spinal surgery fo...
Title of dissertation: Feedback-Directed Model-Based GUI Test Case Generation Xun Yuan, Doctor of Philosophy, 2008 Dissertation directed by: Professor Atif M. Memon Department of Computer Science Most of today’s software users interact with the software through a graphical user interface (GUI), which is a representative of the broader class of event-driven software (EDS). As the correctness of ...
The conclusion of any contract aims at implementation of the obligations arising from it. Morality dictates that people adhere to what they assumed regarding others. The law also supported the moral judgment and in case of breach of obligations to oblige, compensation as a sanction is imposed on obligor. In view of the economic analysis, he also committed to respect his contract and the Contrac...
OBJECTIVE To identify the accuracy and efficiency of the computed tomographic (CT)-based navigation system on upper cervical instrumentation, particularly C1 lateral mass and C2 pedicle screw fixation compared to previous reports. METHODS Between May 2005 and March 2014, 25 patients underwent upper cervical instrumentation via a CT-based navigation system. Seven patients were excluded, while ...
Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores mo...
Traditionally, posthypnotic amnesia has been construed as a subjectively compelling deficit in memory retrieval. Alternatively, it may represent a motivated failure to utilize appropriate retrieval cues, lack of effort in recall, active suppression of memory, or unwillingness to verbalize the critical material. In an effort to test the alternative hypothesis of amnesia, 488 subjects were presen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید