نتایج جستجو برای: 121

تعداد نتایج: 16315  

Journal: :Crop Breeding and Applied Biotechnology 2013

Journal: :International Hydrographic Review 2022

The United Nations Convention on the Law of Sea (UNCLOS) establishes guidelines for management coastal States’ maritime limits and boundaries information. For consistent deposit under UNCLOS, a standards-based approach is required. This article describes development this through IHO S-121 standard. Requirements are outlined, followed by data model methodology. Results outline structure show how...

2009
Hembadoon Piné-Abata Ann McNeill Martin Raw Asaf Bitton Nancy Rigotti Rachael Murray

AIMS To report progress among Parties to the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC) in developing national tobacco treatment guidelines in accordance with FCTC Article 14 guideline recommendations. DESIGN Cross-sectional study. SETTING Electronic survey from December 2011 to August 2012; participants were asked to complete either an online or attached...

2009
Hembadoon Piné-Abata Ann McNeill Rachael Murray Asaf Bitton Nancy Rigotti Martin Raw

AIMS This paper reports the results of a survey of national tobacco dependence treatment services in 36 countries. The objective was to describe the services and discuss the results in the context of Article 14 of the Framework Convention on Tobacco Control, which asks countries to promote adequate treatment for tobacco dependence. DESIGN, SETTING AND PARTICIPANTS A questionnaire on tobacco d...

Journal: :RFC 1991
Luis F. Morales Phillip R. Hasse

Status of this Memo This memo defines a standard way of converting IP addresses to CCITT X.121 addresses and is the recommended standard for use on the Internet, specifically for the Defense Data Network (DDN). This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. 1. Overview The Defense Communication Agency ...

2016
James Wei

Suppose we have some undirected graph G = (GV , GE) represented as an adjacency matrix with |GV | rows and |GV | columns. G is said to be Hamiltonian if there exists a cycle CH that passes through each vertex in GV exactly once. This cycle is called a Hamiltonian cycle. Finding a Hamiltonian cycle in a graph if one exists is an NP-complete problem. We would like to use a zeroknowledge protocol ...

2015
Jeff Gennari David Garlan Jeffrey Gennari

In this report we show how to adapt the notion of “attack surface” to formally evaluate security properties at the architectural level of design and to identify vulnerabilities in architectural designs. Further we explore the application of this metric in the context of architecture-based transformations to improve security by reducing the attack surface. These transformations are described in ...

2009

Unplanned system outages have a negative impact on company revenues and image. While the last decades have seen a lot of efforts from industry and academia to avoid them, they still happen and their impact is increasing. According to many studies, one of the most important causes of these outages is resource exhaustion for different reasons: overload, inadequate system resource planning, or tra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید