نتایج جستجو برای: mousa abadi

تعداد نتایج: 966  

Journal: :Jurnal Entrepreneur dan Entrepreneurship 2022

This study aims to determine the effect of work discipline, environment, andorganizational culture on job satisfaction and employee performance in logisticstransportation companies. uses a sampling technique that is saturated sample.The population used this were all employees PT. Surya Lintas Abadi, totaling56 people. research was conducted from May 2021 December 2021. researchmethod quantitati...

Journal: :Jesya 2023

PT. Tahta Sukses Abadi Medan, better known as the Brastagi Supermarket, former Tiara Hotel. Organizational commitment is still not optimal, indicated by presence of recapitulation data on employee attendance which low, lack desire to work well. An unsupportive physical environment such piling up files that are neatly organized, equipment and supportive because some have been damaged. Regarding ...

1990
Joan Feigenbaum

We present a simple protocol for two-player secure circuit evaluation. The protocol enables players C and D to cooperate in the computation of f(x) while D conceals her data x from C and C conceals his circuit for f from D. The protocol is based on the technique of hiding information from an oracle [Abadi, Feigenbaum, Kilian, J. Comput. System Sci. 39(1):21{50, August, 1989].

1993
Colin Boyd Wenbo Mao

In the past few years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the logic of Burrows, Abadi and Needham (the BAN logic). These logics have been successful in nding weaknesses in various examples. In this paper limitations of the BAN logic are illustrated with two examples. Consideration of the attacks leads to a ...

Journal: :Jurnal Bahtera Inovasi 2022

Human resources have a major role in an organization or company. All aspects related to human the end also affect performance, especially relation employee this study authors focus on Employee Compensation and Performance. This aims determine empirically effect of compensation performance at Jaya Abadi Cooperative. uses population sample 30 employees as respondents. The data collection techniqu...

1997
Andrew D. Gordon Paul D. Hankin Søren B. Lassen

We adopt the untyped imperative object calculus of Abadi and Cardelli as a minimal setting in which to study problems of compilation and program equivalence that arise when compiling objectoriented languages. We present both a big-step and a small-step substitution-based operational semantics for the calculus. Our first two results are theorems asserting the equivalence of our substitutionbased...

2016
Doaa Mousa Nourhan Zayed Inas A. Yassine

7 2 1 8 | P a g e c o u n c i l f o r I n n o v a t i v e R e s e a r c h A u g u s t 2 0 1 6 w w w . c i r w o r l d . c o m Factors Affecting the Segmentation of the Heart Ventricles in Short Axis Cardiac Perfusion MRI Images Doaa Mousa Nourhan Zayed, Inas A. Yassine Computers and Systems Department, Electronics Research Institute, Cairo, Egypt [email protected] Computers and Systems Depart...

2017
Khalid M. Mousa

The aim of the present work is to study the kinetics of leaching process of spent catalyst Ni, Mo/Al2O3 in order to recover the molybdenum using ammonium hydroxide. The investigation depends on the results of previous work ( Mousa et al, 2012). The experiments were conducted in 1-liter stainless steel autoclave. Kinetics study showed that both the diffusion through ash layer and the reaction on...

2014
Wenchao Zhou Yun Mao Boon Thau Loo Martín Abadi Martı́n Abadi

In this paper, we present a unified declarative platform for specifying, implementing, analyzing and auditing large-scale secure information systems. Our proposed system builds upon techniques from logic-based trust management systems, declarative networking, and data analysis via provenance. First, we propose the Secure Network Datalog (SeNDlog) language that unifies Binder, a logic-based lang...

1995
Wenbo Mao

We address a common problem of a series of logics for analysis of authentication protocols due to Burrows-Abadi-Needham (BAN), Gong-Needham-Yahalom (GNY), Abadi-Tuttle (AT) and Syverson-Van Oorschot (SVO). The problem can be referred to as that these logics lack a computationally accountable means to perform an important protocol analysis step, called protocol idealization which is to transform...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید