نتایج جستجو برای: make other usages justified but

تعداد نتایج: 3499405  

Journal: :Politique européenne 2013

2015
P. Patil T. Reddy G. Salgueiro

Application-Layer Protocol Negotiation (ALPN) labels for Session Traversal Utilities for NAT (STUN) usages, such as Traversal Using Relays around NAT (TURN) and NAT discovery, are defined in this document to allow an application layer to negotiate STUN usages within the Transport Layer Security (TLS) connection. ALPN protocol identifiers defined in this document apply to both TLS and Datagram T...

2008
Roberto M. Amadio Mehdi Dogguy

We describe a type system for a synchronous π-calculus formalising the notion of affine usage in signal-based communication. In particular, we identify a limited number of usages that preserve affinity and that can be composed. As a main application of the resulting system, we show that typable programs are deterministic.

Journal: :CoRR 2016
Vitalii Roman'kov

A new scheme of probabilistic subgroup-related encryption is introduced. Some applications of this scheme based on the RSA, Diffie-Hellman and ElGamal encryption algorithms are described. Security assumptions and main advantages of this scheme are discussed. We outline that this scheme is potentially semantically secure under reasonable cryptographic assumptions. 1. Some algorithmic problems fo...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - پژوهشکده ادبیات 1393

testing plays a vital role in any language teaching program. it allows teachers and stakeholders, including program administrators, parents, admissions officers and prospective employers to be assured that the learners are progressing according to an accepted standard (douglas, 2010). the problems currently facing language testers have both practical and theoretical implications but the first i...

2017
Navdeep Kaur

With the dawn of the new era and rising demands of customers, the mobile ad hoc networks has come into full force. But large amount of data usages and complex applications demands the devices to be more and more efficient in terms of utilization of their batteries thus giving rise to most important energy conservation problem in MANETs. The investigators have put forward many routing algorithms...

Journal: :Planning Practice and Research 2023

Planners now work in a variety of alternative career paths contrast to the traditional binary concept working public sector or private sector. This practice review article includes anonymous reflections from eight planning practitioners who ‘other’ employment fields, which reveal important motivations and values. The ability make justified decisions, being pragmatic, clear communication, empath...

ژورنال: پژوهشنامه اخلاق 2014

The most important part in analyzing moral concepts includes those used as predicate in moral sentences covering moral concepts of valuation and obligation. Moral concepts in the field of values include those like “good” and “bad” while obligatory concepts include “ought to” and “ought no” and “duty”. Many papers have been written about “moral obligation”; however, dissociating the area of sema...

Journal: :IOSR Journal of Computer Engineering 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید