نتایج جستجو برای: new concept should satisfy users
تعداد نتایج: 2765667 فیلتر نتایج به سال:
Next generation communications will offer a wide range of services available to users anywhere at any time. Users will have access to multiple networks at the same time. So there is a need that the user should be able to roam seamlessly among the multiple access network technologies. Vertical handover decision algorithms are essential components of the fourth generation (4G) heterogeneous wirel...
We have shown that Zn is a group under addition and Zn is a group under multiplication (set of all numbers co-prime to n in Zn). Till now, the two operations + and × have been treated differently. But from our experience with integers and even matrices, these operations satisfy properties like “distribution” (a(b+ c) = ab+ ac). Hence, after success in defining an abstract structure with one ope...
We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time t, when a trusted third party (called Time Server) publishes some trapdoor information associated with the time t. In addition, time capsule signature should satisfy the following properties: (1) If the signer wants, she can make h...
the concept of health promotion, first appeared in 1975, introduced a new perspective for health activities. as a consequences, the world health organization (who) suggested that attention to health promotion needs should take precedence over treatment and prevention. this concept gradually developed into mental health field and now community mental health is the core policy and orientation of ...
Purpose: To evaluate whether current clinical criteria and confirmatory tests for the diagnosis of "brain death" satisfy the requirements for irreversible cessation of functions of the entire brain including the brain stem. Methods: a) Presentation of known arguments from the medical and philosophical literature as well as several novel arguments. b) Suggestion for the application of PET into t...
The success rate for acquiring automated information systems (AIS) continues to be a source of considerable interest to Congress and the Department of Defense. Building upon Defense Science Board recommendations, the authors' research identifies improvements for initiating information systems acquisition. Adding a soft start period prior to the Materiel Development Decision allows the acquisiti...
Anonymous credentials are a fundamental technology for preserving end users’ privacy by enforcing data minimization for online applications. However, the design of user-friendly interfaces that convey their privacy benefits to users is still a major challenge. Users are still unfamiliar with the new and rather complex concept of anonymous credentials, since no obvious real-world analogies exist...
Traditional Information Retrieval (IR) research has focussed on a single user interaction modality, where a user searches to satisfy an information need. Recent advances in web technologies and computer hardware have enabled multiple users to collaborate on many computer-supported tasks, therefore there is an increasing opportunity to support two or more users searching together at the same tim...
Mobile cloud computing systems are getting increasingly popular because they can facilitate many new applications, such as opportunistic social computing by smartphone users who happen to be at a scene of importance (e.g., disaster rescue), while possibly uploading compute-heavy tasks to the resource-rich clouds. Federated mobile cloud computing further allows to coordinate and optimize the ser...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید