نتایج جستجو برای: thus it
تعداد نتایج: 3249812 فیلتر نتایج به سال:
Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software...
This paper describes our retrieval system participated in the Patent Retrieval Task at the Fourth NTCIR Workshop. The main task was an associative patent retrieval task, in which a patent application including a target claim is used to search documents that can invalidate the demand in the claim. Our system can be characterized by the structure analysis for both target claim and entire applicat...
Construction Projects are being implemented under different contract systems in the Midwest. Negotiated design-build has been a popular contract system in recent years. It provides various advantages through entailing the contractor to be responsible for the whole project. However, design-build turns out to be risky system for both owners and contractors unless the risks are identified, quantif...
An effect observable across many different domains is that negative instances tend to be more influential than comparably positive ones. This phenomenon has been termed the negativity bias. In the current work, it was investigated whether this effect pertains to judgments of truth. That is, it was hypothesized that information valence and perceived validity should be associated such that more n...
learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...
The theme of this paper is the occurrence of risks within information technology and information systems investments. A taxonomy of the published classification frameworks of IT related risk is presented and a new comprehensive classification framework for IT investments (the TOPModel) is presented within the TRIP model of the risk factors and critical factors affecting IT investments. Risk man...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید