نتایج جستجو برای: users violations

تعداد نتایج: 222582  

2013
Maria Leitner

Role-based Access Control (RBAC) is de facto standard for access control in Process-aware Information Systems (PAIS); it grants authorization to users based on roles (i.e. sets of permissions). So far, research has centered on the design and run time aspects of RBAC. An evaluation and veri cation of a RBAC system (e.g., to evaluate ex post which users acting in which roles were authorized to ex...

2015
M. Kriushanth L. Arockiam J. Li M. Mao A. Ruiz-Alvarez

Cloud computing is one of the fastest growing technology. Pay-as-you-go model attracts the customer to utilize the large amount of cloud services in very low cost. Scalability and virtualization plays a vital role to achieve this goal. Scalability is the ability to find the number of users and to provide the service accordingly. Scaling can be divided into two, namely Auto-scaling or dynamic sc...

2009
Mariagrazia Fugini Hossein Siadat

This paper discusses a framework for contract-based monitoring and adaptation with respect to customers’ goals seen as an important part of Service Level Agreement (SLA) contracts. Within standard SLA contracts concepts, as mutual agreements between service providers and users, we introduce Key Goal Indicators (KGIs). These are parameters that state how well service-based processes achieve the ...

Journal: :Foristek: Forum Teknik Elektro dan Teknologi Informasi 2021

Current road users cannot be separated from the number of violators, therefore traffic lights are made to regulate on road. At lights, there is also a zebra crossing which serves as means for pedestrians. To minimize violations at intersections, researchers designed tool detect violations.
 Traffic violation detection in prototype form using control system with Arduino nano and software. T...

2009
Cees H. Taal Richard C. Hendriks Richard Heusdens Jesper Jensen Ulrik Kjems

In this research various objective quality measures are evaluated in order to predict the intelligibility for a wide range of non-linearly processed speech signals and speech degraded by additive noise. The obtained results are compared with the prediction results of a more advanced perceptual-based model proposed by Dau et al. and an objective intelligibility measure, namely the coherence spee...

2013
Monica Chew Sid Stamm Josephine Baker Colleen Lachowicz Bobbi Duncan Taylor McCormick

We examine contextual identity, a notion that individuals reveal different aspects of themselves depending on context. At any given time, an individual may act as a friend, relative, spouse, co-worker, acquaintance, or stranger. We analyze contextual identity from the perspective of user choice and control, survey contextual identity violations, and propose new research directions to enable use...

Journal: :international journal of health policy and management 2015
hyosun kim

background for the purpose of understanding the food and drug administration’s (fda’s) concerns regarding online promotion of prescription drugs advertised directly to consumers, this study examines notices of violations (novs) and warning letters issued by the fda to pharmaceutical manufacturers.   methods the fda’s warning letters and novs, which were issued to pharmaceutical companies over a...

ژورنال: بیمارستان 2018

Background: Administrative violations of employees at their workplace create a conflict between individual and organizational goals. Due to the long process of handling these violations, this study aimed to identify and present some suitable solutions in order to reduce delay in the health sector.   Materials and Methods: This study was carried out at three steps. At the first step, causes of...

Journal: :International journal of medical informatics 2010
Jeungok Choi Suzanne Bakken

PURPOSE Low health literacy has been associated with poor health-related outcomes. The purposes are to report the development of a website for low-literate parents in the Neonatal Intensive Care Unit (NICU), and the findings of heuristic evaluation and a usability testing of this website. METHODS To address low literacy of NICU parents, multimedia educational Website using visual aids (e.g., ...

2003
Kåre Synnes James Nord Peter Parnes

An increasing number of systems use contextual information about their users. Such contextual information can be used to design applications that survey usage and adapt thereafter, or simply just use context information to optimize presentation. Context information could therefore be used to create applications for the benefit of the users of the system, but the same information could cause ser...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید