نتایج جستجو برای: oriented to end users
تعداد نتایج: 10696442 فیلتر نتایج به سال:
Wireless body Area networks (WBANs) include a number of sensor nodes placed inside or on the human body to improve patient health and quality of life. Ensuring the transfer and receipt of data in sensitive data is a very important issue. Routing algorithms should support a variety of service quality such as reliability and delay in sending and receiving data. Loss of information or excessive da...
abstract the present study investigated the effects of task types and involvement load hypothesis on incidental learning of 10 target words (tws) in junior high schools (jhss) in givi, ardabil. the tasks deployed in this study were two input-based tasks (reading plus dictionary use with an involvement index of 3, and reading plus gap-fill task with an involvement index of 2), and one output-ba...
The development of modern Web 2.0 applications is increasingly characterized by the involvement of end users with typically limited programming skills. In particular, an emerging practice is the development of web mashups, i.e., applications based on the composition of contents and functions that are accessible via the Web. In this article, we try to explain the ingredients that are needed for ...
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on related designs for transparency of web server certificates but solves several new challenges specific to key verification for end users. In comparison to prior designs, CONIKS enables more efficient monitoring and auditing of keys, allowing small organi...
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates but solves several new challenges specific to key verification for end users. CONIKS obviates the need for global third-party monitors and enables users to efficiently monitor their own key bindings ...
Soon every desk will have a computer on it. Software to do mundane things such as payroll, mail, and text processing exists and as a by-product produces vast quantities of on-line in formation. Many users want to manipulate this data, often in unanticipated ways. These unexpected uses cannot justify substantial programming costs. This paper argues that the relational data model and operators co...
This article presents a framework for editing, publishing and sharing XML content directly from within the browser. It comes in two parts: XTiger XML and AXEL. XTiger XML is a document template specification language for creating document models. AXEL is a client-side Javascript library that turns the document template into a document editing application running in the browser. This framework i...
Promotion of e-resources in library settings remains to be an obstacle for its efficient use. There are three main reasons insufficient use e-resources: majority users remain unaware availability e-collections their institutions, lack searching skills among end-users, low level competency librarians on and e-platforms. The support training end-users results poor usage research oriented e-resour...
the concepts of similarity and dissimilarity have been the interest of many researchers. basically, in the studies the similarity between two objects or phenomena, has been discussed. in this thesis, we consider the case when the resemblance or similarity among three objects or phenomena of a set, 3-similarity in our terminology, is desired. later we will extend our definitions and propos...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید