نتایج جستجو برای: indication
تعداد نتایج: 38592 فیلتر نتایج به سال:
This study investigated student adoption of university campus card (UCC) applications. A review of smart card, technology adoption and Unified Theory of Acceptance and Use of Technology (UTAUT) literature led to three focus groups and a survey of student perceptions and attitudes towards the university’s campus card. Perceptions of 17 UCC components differed significantly across four student va...
Driven by the development of wireless services with the advent of smart phone along with iPhone, wireless services are drawing attentions rather than PC internet based wired services. Since this technique is a mobile device judged as being in an environment suitable to provide SNS, there also need be researches. This research proposed mobile based SNS-UCC design through mobile based SNS-UCC wri...
The main goal of the US National Library of Medicine (NLM) Index ing Initiative is to explore indexing methodologies that may help the NLM In dexing staff keep pace with the ever increasing challenges of indexing over 700,000 MEDLINE citations each year using a vocabulary of over 27,000 MeSH Descriptors and 220,000 MeSH Supplementary Concept Records. The BioASQ Challenge has been a tremendous...
In this paper we give a brief introduction to five different distance vector routing protocols (RIP, AODV, EIGRP, RIP-MTI and Babel) and give some of our thoughts on how to solve the count to infinity problem. Our focus is how distance vector routing protocols, based on limited information, can prevent routing loops and the count to infinity problem.
Moving target defenses have been proposed as a way to make it much more difficult for an attacker to exploit a vulnerable system by changing aspects of that system to present attackers with a varying attack surface. The hope is that constructing a successful exploit requires analyzing properties of the system, and that in the time it takes an attacker to learn those properties and construct the...
The task of alert detection in event logs, i.e. determining which events in the event log require action from an administrator, is very important in preventing or recovering from downtime events. The ability to do this automatically and accurately provides significant savings in time and cost of downtime events. In this work we combine message type extraction based alert detection with the entr...
We have calculated constraints on the evolution of the equation of state of the dark energy, w(z), from a joint analysis of data from the cosmic microwave background, large scale structure and type-Ia supernovae. In order to probe the timeevolution of w we propose a new, simple parametrization of w, which has the advantage of being transparent and simple to extend to more parameters as better d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید