نتایج جستجو برای: bolagha tryied to implement avicinna

تعداد نتایج: 10615255  

Journal: :International Journal of E-business Research 2023

In line with marketers' growing use of product placement on YouTube, this study investigates elements YouTube that can ultimately affect viewers' purchase intention based the theory reasoned action framework. Structural equation modeling data collected from 355 usable respondents demonstrates three core attitudes toward brands which, in turn, intention: relevance a brand to YouTuber's content, ...

Journal: :IACR Cryptology ePrint Archive 2006
He Ge

In this report we present an efficient anonymous authentication scheme that works in a manner similarly to the so-called Direct Anonymous Attestation in the setting of the Trusted Computing Platform. Our construction implements features such as total anonymity, variable anonymity, and rogue TPM tagging. The new scheme is significantly simpler, and more efficient than the current solution that h...

2008
Eric S. Maskin Albert O. Hirschman Luis Corchon

Journal: :Journal of applied behavior analysis 2003
Michael M Mueller Cathleen C Piazza James W Moore Michael E Kelley Stephanie A Bethke Angela E Pruett Amanda J Oberdorff Stacy A Layer

Four different multicomponent training packages were evaluated to increase the treatment integrity of parents implementing pediatric feeding protocols. In Study 1 we exposed 3 parents to a training package that consisted of written protocols (baseline), verbal instructions, therapist modeling, and rehearsal training. Results suggested that the package was successful in increasing treatment inte...

2006
Antonio Fernández Ernesto Jiménez Sergio Arévalo

In this paper we explore the minimal system requirements to implement unreliable failure detectors. We first consider systems formed by lossy asynchronous and eventually timely links. On these systems we define two properties, the Weak Property and the Strong Property, depending on whether all correct processes can be reached with links that are not lossy asynchronous from one or from all corre...

2016
Itaru Ueda Akihiro Nishimura Yu-ichi Hayashi Takaaki Mizuki Hideaki Sone

By using a deck of cards, it is possible to realize a secure computation. In particular, since a new shuffling operation, called a random bisection cut, was devised in 2009, many efficient protocols have been designed. The shuffle functions in the following manner. A sequence of cards is bisected, and the two halves are swapped randomly. This results in two possible cases, depending on whether ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید