نتایج جستجو برای: social code

تعداد نتایج: 771623  

2005
Pengzhu Zhang Fangfang Xu Luquan Jiang

Digital government strategy has been carried out in many countries as a means of improving the quality of public services. This article studies the Shanghai social security and citizen services system to explain the major advantages of digital government and specifies the Medicare subsystem of the system to illustrate the process reengineering involved in digital government programs.

1999
Gerald C. Gannod Betty H. C. Cheng

Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections and surveys, the evaluation of the corresponding support tools has focused primarily on their usability and supported source languages, mostly ignoring evaluation of the appropriateness of the by-products of a tool fo...

2014
Fred Morstatter Nichola Lubold Heather Pon-Barry Jürgen Pfeffer Huan Liu

Disaster response agencies incorporate social media as a source of fast-breaking information to understand the needs of people affected by the many crises that occur around the world. These agencies look for tweets from within the region affected by the crisis to get the latest updates on the status of the affected region. However only 1% of all tweets are “geotagged” with explicit location inf...

Journal: :IEEE Trans. Information Theory 1986
Khaled A. S. Abdel-Ghaffar Robert J. McEliece Andrew M. Odlyzko Henk C. A. van Tilborg

I N THIS PAPER, a binary code is called a b-burst-correcting code if it can correct any single cyclic burst of length b, or less. If C is an [n, n r] b-burst-correcting code, then the syndromes corresponding to the different cyclic bursts of lengths I b should be nonzero and distinct. Since there are n2b-’ different cyclic bursts of length up to b, it follows that 2’ 2 1 + n2’-‘. Abramson [l] n...

Journal: :IEEE Trans. Information Theory 1997
Roberto De Prisco Alfredo De Santis

It is proven that for every random variable with a countably infinite set of outcomes and finite entropy there exists an optimal prefix code which can be constructed from Huffman codes for truncated versions of the random variable, and that the average lengths of any sequence of Huffman codes for the truncated versions converge to that of the optimal code. Also, it is shown that every optimal i...

Journal: :The American Mathematical Monthly 2006
Carlos D'Andrea Emiliano Gómez

A popular question in recreational mathematics is the following: If we drop a spaghetti noodle and it breaks at two random places, what is the probability that we can form a triangle with the three resulting segments? See for example [2, chap.1, sec.6], [3, p.6], [4, p.31], or [7, p.30-36]. This is an elementary problem in geometric probability. Clearly the length of the noodle (or equivalently...

2008
Robertas Damasevicius

Information systems are designed, constructed, and used by people. Therefore, a software design process is not purely a technical task, but a complex psycho-socio-technical process embedded within organizational, cultural, and social structures. These structures influence the behavior and products of the programmer’s work such as source code and documentation. This chapter (1) discusses the non...

Journal: :Computers & Security 2017
Hossein Siadati Toàn Nguyên Payas Gupta Markus Jakobsson Nasir D. Memon

SMS-based second factor authentication is a cornerstone for many service providers, ranging from email service providers and social networks to financial institutions and online marketplaces. Attackers are not slow to capitalize on the vulnerabilities of this mechanism, using social engineering techniques to coerce users to forward authentication codes. We demonstrate one social engineering att...

2014
Li Xiang Xiabing Zheng Xi Hu

Social commerce (SC) has become a new business mode for e-commerce along with the increased popularity of social networking sites, such as Facebook, Twitter, and Pinterest. Although SC has enormous business potential for practitioners and broadens research areas for scholars, existing studies on SC were limited. Little is known about the underlying processes and factors of consumers’ social sha...

Journal: :JTHTL 2012
Zak Brown

INTRODUCTION ..................................................................................... 421 I. STUDENT SPEECH ............................................................................... 423 A. Tinker and its descendants .................................................... 423 B. The complexities of speech on college campuses ................. 426 C. Public vs. private institution...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید