نتایج جستجو برای: eap research

تعداد نتایج: 1404470  

Journal: :Journal of studies on alcohol and drugs 2008
Karen Chan Osilla Erin dela Cruz Jeremy N V Miles Steven Zellmer Katherine Watkins Mary E Larimer G Alan Marlatt

Brief intervention (BI) research has traditionally examined alcohol and drug use outcomes; however it is unknown whether BIs can also impact on-the-job productivity. This exploratory study examines changes in workplace productivity and related costs for clients receiving a BI for at-risk drinking in the employee assistance program (EAP). Participants were 44 clients attending the EAP for behavi...

Journal: :The Yale Journal of Biology and Medicine 1989
A. Colantonio

Employee assistance programs have grown at a dramatic rate, yet the effectiveness of these programs has been called into question. The purpose of this paper was to assess the effectiveness of employee assistance programs (EAPs) by reviewing recently published EAP evaluations. All studies evaluating EAPs published since 1975 from peer-reviewed journals in the English language were included in th...

Journal: :RFC 2013
Julien Bournelle Lionel Morand Sebastien Decugis Qin Wu Glen Zorn

The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...

2004
J. Arkko H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP-AKA includes optional identity privac...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1389

abstract the primary purpose of this study was to explore the actual practices and cognitions of two groups of iranian eap teachers, i.e. language teachers and content teachers, with respect to teaching reading-comprehension and vocabulary. to this end, tehran university of medical sciences which authorizes both groups of teachers to teach eap courses was selected as the context of the study s...

Journal: :Computer Networks 2009
Salekul Islam J. William Atwood

IP multicast is best-known for its bandwidth conservation and lower resource utilization. The present service model of multicast makes it difficult to restrict access to authorized End Users (EUs) or paying customers. Without an effective receiver access control, an adversary may exploit the existing IP multicast model, where a host or EU can join any multicast group by sending an Internet Grou...

2011
Zhun Gong Yong Wang

The occupational health area is developing models with a variety of methods to address and prevent job stress at the organization-level. A review of literature on employee assistance program (EAP) was conducted to explore relevant methods from its perspective. Result reveals that EAP is a potential good partner in the efforts to prevent Job stress at organization-level. Keywords-job stress; str...

2009
Olaf Beyersdorff Yevgen Nebesov

In this paper we suggest a new approach to timetable information by introducing the “edge-converted graph” of a timetable. Using this model we present simple algorithms that solve the earliest arrival problem (EAP) and the minimum number of transfers problem (MNTP). For constant-degree graphs this yields linear-time algorithms for EAP and MNTP which improves upon the known Dijkstra-based approa...

Journal: :RFC 2008
T. Charles Clancy Madjid Nakhjiri Vidya Narayanan Lakshminath R. Dondeti

This document describes the Handover Keying (HOKEY) re-authentication problem statement. The current Extensible Authentication Protocol (EAP) keying framework is not designed to support re-authentication and handovers without re-executing an EAP method. This often causes unacceptable latency in various mobile wireless environments. This document details the problem and defines design goals for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید