نتایج جستجو برای: by a third party dose not suspend execution ofjudgment

تعداد نتایج: 15112796  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

toury (1978:200) believes that translation is a kind of activity which inevitably involves at least two languages and two cultural traditions. being polite while asking for something takes place differently in different cultures and languages, therefore various strategies may be applied for making requests and also translation of them in order not to disturb or threaten the face or better to sa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

اهمیت این پژوهش در آن بود که به گفت? بسیاری از پژوهشگرانِ حوز? بازبینی ترجمه، ادبیات موجود در این زمینه به لحاظ نظری و عملی چندان قوی نیست و بخش های موجود نیز برداشت مناسبی از این مرحل? فرایند ترجمه ندارند، اگرچه اخیراً توجه به آن به صورت نظام مند افزایش یافته است. در عین حال، پژوهش های موجود از یک سو بر دگربازبینی بیشتر از خودبازبینی تأکید دارند و از دیگر سو تنها به لحاظ نظری به این موضوع می پرد...

Journal: :Theor. Comput. Sci. 2002
Vitaly Shmatikov John C. Mitchell

Optimistic contract signing protocols allow two parties to commit to a previously agreed upon contract, relying on a third party to abort or connrm the contract if needed. These protocols are relatively subtle, since there may be interactions between the subprotocols used for normal signing without the third party, aborting the protocol through the third party, or requesting connrmation from th...

Journal: :J. Log. Algebr. Program. 2003
Rohit Chadha John C. Mitchell Andre Scedrov Vitaly Shmatikov

A contract signing protocol lets two parties exchange digital signatures on a pre-agreed text. Optimistic contract signing protocols enable the signers to do so without invoking a trusted third party. However, an adjudicating third party remains available should one or both signers seek timely resolution. We analyze optimistic contract signing protocols using a game-theoretic approach and prove...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1390

supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...

2007
Ross McIlroy Orion Hodson

Modern computing systems incorporate a plethora of auxiliary processing cores located on devices such as graphics cards, network devices and raid controllers. These processors are becoming increasingly sophisticated and could provide application offloading if exploitable by third party code. However, to provide an environment for practical general purpose application offloading, the operating s...

2006
Zinaida Benenson Felix C. Freiling Birgit Pfitzmann Christian Rohner Michael Waidner

We introduce verifiable agreement as a fundamental service for securing mobile peer-to-peer ad hoc networks, and investigate its solvability. Verifiability of a protocol result means that the participants can prove that the protocol reached a particular result to any third party (the verifier) which was not present in the network at the time of the protocol execution.

پایان نامه :0 1374

the following null hypothesis was proposed: h : there is no significant difference between the use of semantically or communicatively translates scientific texts. to test the null hypothesis, a number of procedures were taken first, two passages were selected form soyrcebooks of food and nutrition industry and gardening deciplines. each, in turn, was following by a number of comprehension quest...

1997
Lawrie Brown

In order to support outsourced and third party telecommunications applications, there is a desire to modify the Erlang language and execution environment to provide safe and partitioned execution of externally sourced or outsourced programs which are imported and run on a local Erlang system. This paper outlines a possible design approach, and describes the initial prototype.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید