نتایج جستجو برای: it has some problems it illogically compares two decision
تعداد نتایج: 6589112 فیلتر نتایج به سال:
There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract therefore difficult to generalize or even identify in real networks. While some papers distinct different attacker types, the usual approach is to present an anonymization technique and then to develop an attacker model for it in order to identify properties o...
Computational models are intensively used in engineering for risk analysis or prediction of future outcomes. Uncertainty and sensitivity analyses are of great help in these purposes. Although several methods exist to perform variance-based sensitivity analysis of model output with independent inputs only a few are proposed in the literature in the case of dependent inputs. This is explained by ...
In recent years, we have experienced the proliferation of videogames that have, as their main mode of play, the creation of in-game content. Even though existing literature has looked into various characteristics of these games, one of their aspects that warrants further exploration is the monetisation practices that can emerge in their context. Through our ongoing ethnographic study, we became...
As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organization's overall IT risk management. Recent publicity concerning losses incurred by companies becauseofproblcms with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an att...
Twitter has become a major source of data for social media researchers. One important aspect of Twitter not previously considered are deletions – removal of tweets from the stream. Deletions can be due to a multitude of reasons such as privacy concerns, rashness or attempts to undo public statements. We show how deletions can be automatically predicted ahead of time and analyse which tweets are...
We present a solution for modeling the dependencies of an IT infrastructure and determine the availability of components and services therein using Markov logic networks (MLN). MLNs offer a single representation of probability and first-order logic and are well suited to model dependencies and threats. We identify different kinds of dependency and show how they can be translated into an MLN. Th...
the hub location decision is a long term investment and any changes in it take considerable time and money. in real situations, some parameters are uncertain hence, deterministic models cannot be more efficient. the ability of two-stage stochastic programming is to make a long-term decision by considering effects of it in short term decisions simultaneously. in the two-stage stochastic programm...
this thesis attempts to measure learning styles, self efficacy and intrinsic motivation as predictors of iranian ielts reading comprehension. in order to address this issue, a quantitative study was conducted on some randomly selected intact students at ferdowsi university. these two groups were assigned as they were undergraduate (ba=91) and graduate (ma =74) students; they were all aged betwe...
this study investigates the strategies native english and persian speakers employ for expressing gratitude in different situations. the strategies of persian efl learners are also compared with english strategies in order to find the differences that may exist between these two languages. social status and size of imposition of the favor are social variables which are investigated in detail for...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید