نتایج جستجو برای: indication

تعداد نتایج: 38592  

Journal: :IJTHI 2011
Jamie Murphy Richard Yee Lee Evan Swinger

This study investigated student adoption of university campus card (UCC) applications. A review of smart card, technology adoption and Unified Theory of Acceptance and Use of Technology (UTAUT) literature led to three focus groups and a survey of student perceptions and attitudes towards the university’s campus card. Perceptions of 17 UCC components differed significantly across four student va...

2010
Hae Sun No Dae Woong Rhee

Driven by the development of wireless services with the advent of smart phone along with iPhone, wireless services are drawing attentions rather than PC internet based wired services. Since this technique is a mobile device judged as being in an environment suitable to provide SNS, there also need be researches. This research proposed mobile based SNS-UCC design through mobile based SNS-UCC wri...

2014
James G. Mork Dina Demner-Fushman Susan Schmidt Alan R. Aronson

The main goal of the US National Library of Medicine (NLM) Index­ ing Initiative is to explore indexing methodologies that may help the NLM In­ dexing staff keep pace with the ever increasing challenges of indexing over 700,000 MEDLINE citations each year using a vocabulary of over 27,000 MeSH Descriptors and 220,000 MeSH Supplementary Concept Records. The BioASQ Challenge has been a tremendous...

Journal: :CoRR 2011
Linpeng Tang Qin Liu

In this paper we give a brief introduction to five different distance vector routing protocols (RIP, AODV, EIGRP, RIP-MTI and Babel) and give some of our thoughts on how to solve the count to infinity problem. Our focus is how distance vector routing protocols, based on limited information, can prevent routing loops and the count to infinity problem.

2011
David Evans Anh Nguyen-Tuong John C. Knight

Moving target defenses have been proposed as a way to make it much more difficult for an attacker to exploit a vulnerable system by changing aspects of that system to present attackers with a varying attack surface. The hope is that constructing a successful exploit requires analyzing properties of the system, and that in the time it takes an attacker to learn those properties and construct the...

2009
Adetokunbo Makanju A. Nur Zincir-Heywood Evangelos E. Milios

The task of alert detection in event logs, i.e. determining which events in the event log require action from an administrator, is very important in preventing or recovering from downtime events. The ability to do this automatically and accurately provides significant savings in time and cost of downtime events. In this work we combine message type extraction based alert detection with the entr...

2004
Steen Hannestad

We have calculated constraints on the evolution of the equation of state of the dark energy, w(z), from a joint analysis of data from the cosmic microwave background, large scale structure and type-Ia supernovae. In order to probe the timeevolution of w we propose a new, simple parametrization of w, which has the advantage of being transparent and simple to extend to more parameters as better d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید