نتایج جستجو برای: occupational opportunity

تعداد نتایج: 146675  

2011
Jakob E. Bardram

This position paper describes the Activity-Based Computing (ABC) project which has been ongoing in Denmark since 2003. Originally, the project took its outset in the design of a pervasive computing platform suited for the mobile, collaborative, and time-critical work of clinicians in a hospital setting. Out of this grew a conceptual framework, a set of six ABC principles, and a programming and ...

2012
Peter Ndichu Muriuki

The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been sl...

2008
Geir Overskeid

Cognitivism has dominated mainstream psychology for decades, but lately its position has been weakened. It has been criticized not only by behavior analysts but also by social and evolutionary psychologists, neuroscientists, and authors who are or used to be cognitivists themselves. At the same time, psychologists and neuroscientists in several fields are now rediscovering the necessity of unde...

2006
Massimo Massa Lei Zhang

We study the impact of style investing on the market for corporate control. We argue that a firm may choose to boost its market value by merging with a firm that belongs to a style that is more favored by the market. By using data on the flows in mutual funds, we construct a measure of neglectedness, which relies directly on the identification of sentiment-induced investor demand, rather than b...

Journal: :Inf. Soc. 2011
Leysia Palen Sarah Vieweg Kenneth Mark Anderson

This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date...

Journal: :The American journal of occupational therapy : official publication of the American Occupational Therapy Association 2000
M M Pelczarski

The Guide to Occupational Therapy Practice by Moyers (AJOT, 53[3], 247–322) is an attempt to define the general scope of occupational therapy for practitioners, health care professionals, teachers, reimbursement organizations, and policymakers. The document, however, raises a major concern about what truly is our profession’s scope of practice. There is an overriding emphasis placed on occupati...

Journal: :Comput. Graph. Forum 2017
Haichao Miao Gabriel Mistelbauer Christian Nasel Eduard Gröller

This paper presents a method for the visual quantification of cerebral arteries, known as the Circle of Willis (CoW). It is an arterial structure with the responsibility of supplying the brain with blood, however, dysfunctions can lead to strokes. The diagnosis of such a time-critical/urgent event depends on the expertise of radiologists and the applied software tools. They use basic display me...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Giampaolo Bella Stefano Bistarelli Pamela Peretti Salvatore Riccobene

Risk analysis has recently emerged as a structured and precise methodology to help modern companies understand their risks and plan the relative countermeasures well in advance. It is based on a number of indicators: parameters that quantify the key concepts on which an enterprise designs its security and safety investments. A modificator is a function that further modifies an existing indicato...

2011
James Brown Ben McCarthy Utz Roedig Thiemo Voigt Cormac J. Sreenan

In this paper we present BurstProbe, a new technique to accurately measure link burstiness in a wireless sensor network employed for time-critical data delivery. Measurement relies on shared probing slots that are embedded in the transmission schedule and used by nodes to assess link burstiness over time. The acquired link burstiness information can be stored in the node's ash memory and relied...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید