نتایج جستجو برای: what actually emphasis on
تعداد نتایج: 8585068 فیلتر نتایج به سال:
School bullying is a serious, worldwide problem which is not easily counteracted. The present study focuses on the perspective of former victims, asking them what it was that made the bullying stop in their case. Participants were 273 18-year-old former victims in Sweden, a country in which schools are doing extensive work against bullying and the bullying prevalence is relatively low. Results ...
This paper briefly and informally surveys different theoretical models of relative concerns and their relation to inequality. Models of inequity aversion in common use in experimental economics imply a negative relation between inequality and happiness. In contrast, empirical studies on happiness typically employ models of relative concerns that assume that increases in others’ income always ha...
Abrishami, Oortwijn, and Hofman (AOH) attribute to me a position I do not hold and an argument I did not make. The purpose of this note is make clear what my position actually is and to clarify the main differences between health technology assessment (HTA) and cost-effectiveness analysis (CEA).
Linked Data has become a popular term and method of how to expose structured data on the Web. There currently are two school of thought when it comes to defining what Linked Data actually is, with one school of thought defining it more narrowly as a set of principles describing of how to publish data based on Semantic Web technologies, whereas the other school more generally defines it as any f...
BACKGROUND In most phase I oncology trials, it is often stated that the dose increments follow a "modified-Fibonacci sequence". This term, however, is vague. METHODS To better characterize this sequence, we reviewed 81 phase I trials based on this concept. RESULTS Out of 198 phase I oncology trials, 81 (41%) are based on modified-Fibonacci series. Actual incremental ratios varied in a large...
et al., 2012). The sense of roll is consistent with a host of other studies using GVS (Fitzpatrick et al., 1994; Inglis et al., 1995; Day et al., 1997; Zink et al., 1997; Day and Cole, 2002; Scinicariello et al., 2002/2003; Wardman et al., 2003a,b; see Fitzpatrick and Day, 2004 for review). Modeled on this research, we used 2–3 mA currents in lightly anesthetized rats and found strong activatio...
The advent of formally verified OS kernels means that for the first time we have a truly trustworthy foundation for systems. In this paper we explore the design space this opens up. The obvious applications are in security, although not all of them are quite as obvious, for example as they relate to TPMs. We further find that the kernel’s dependability guarantees can be used to improve performa...
Many key-value stores have recently been proposed as platforms for always-on, globally-distributed, Internetscale applications. To meet their needs, these stores often sacrifice consistency for availability. Yet, few tools exist that can verify the consistency actually provided by a key-value store, and quantify the violations if any. How can a user check if a storage system meets its promise o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید