نتایج جستجو برای: eap articles

تعداد نتایج: 107749  

Journal: :RFC 2012
Zhen Cao Hui Deng Qin Wu Glen Zorn

The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Antici...

2015
Parisa Mehran Mehrasa Alizadeh

Iranian universities have recently displayed a growing interest in integrating Computer-Assisted Language Learning (CALL) into teaching/learning English. The English for Academic Purposes (EAP) context, however, is not keeping pace with the current changes since EAP courses are strictly text-based and exam-oriented, and little research has thus far been conducted on using computers in EAP class...

2014
Costanza Biavaschi Klaus F Zimmermann

Despite the ongoing dialogue on facilitating mobility between the European Union and the Eastern Partnership (EaP) countries, very little is known about the magnitude and characteristics of migration from these countries. We find that EaP migrants experience worse labor market outcomes than other migrant groups, but current and potential migrants hold qualifications in those areas were skill sh...

Journal: :RFC 2009
T. Charles Clancy Hannes Tschofenig

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo defines an Extensible ...

Journal: :CoRR 2014
Duyu Tang Bing Qin Ting Liu Qiuhui Shi

Weibo, as the largest social media service in China, has billions of messages generated every day. The huge number of messages contain rich sentimental information. In order to analyze the emotional changes in accordance with time and space, this paper presents an Emotion Analysis Platform (EAP), which explores the emotional distribution of each province, so that can monitor the global pulse of...

2012
Aurobrata Ghosh Rachid Deriche

Generalized diffusion tensor imaging (GDTI) was developed to model complex apparent diffusivity coefficient (ADC) using higher-order tensors (HOTs) and to overcome the inherent single-peak shortcoming of DTI. However, the geometry of a complex ADC profile does not correspond to the underlying structure of fibers. This tissue geometry can be inferred from the shape of the ensemble average propag...

Abstract: Lexical bundles, as building blocks of coherent discourse, have been the subject of much research in the last two decades. While many of such studies have been mainly concerned with  exploring  variations  in  the  use  of  these  word  sequences  across  different  registers  and disciplines, very few have addressed the use of some particular groups of lexical bundles within some gen...

Hassan Soodmand Afshar, Hossein Movassagh, Mehdi Doosti,

This study investigated the cross-disciplinary variations in the generic structure of Introduction sections of 52 Applied Linguistics and 52 Chemistry research articles drawing upon Swales’ (2004) framework, taking into account the new insights proposed by Bhatia (2004), Shehzad (2008), and Lim (2012, 2014). To this end, in addition to collecting quantitative data and conducting frequency and C...

Abdullah Sarani, Amir Talati

The language register used in academic communities has the special features of density, complexity, and abstractness which are associated with nominalization with which new members of the communities might not be familiar. To explore the possible distance between novice and established members regarding their awareness of this grammatical feature, the present study investigated the employment o...

2006
J. Arkko H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید