نتایج جستجو برای: in partial breach
تعداد نتایج: 17011741 فیلتر نتایج به سال:
This paper is about the remedy of disgorgement for breach of contract. In it I argue for two conclusions. I first argue that, prima facie at least, disgorgement damages for breach of contract present something of a puzzle. But second, I argue that if we pay close attention to the notion of contractual performance, this puzzle can be resolved in a way that is consistent with principles of correc...
A violation of trust can have quite different consequences, depending on the nature of the relationship in which the trust breach occurs. In this article, we identify a key relationship characteristic that affects trust recovery: the extent of relationship experience before the trust breach. Across two experiments, this investigation establishes the behavioral effect that greater relationship e...
We present a systematic development of energy-stable approximations of the two-dimensional shallow water (SW) equations, which are based on the general framework of entropy conservative schemes introduced in [Tad03, TZ06]. No artificial numerical viscosity is involved: stability is dictated solely by eddy viscosity. In particular, in the absence of any dissipative mechanism, the resulting numer...
Traditional flexible endoscopy has been limited to the confines of the gastrointestinal lumen; however, recent developments involving translumenal access to intra-abdominal structures hold the potential to revolutionize flexible endoscopy. Over the past few years various studies have detailed techniques that intentionally breach the lumen and provide endoscopic access to the peritoneal cavity f...
Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...
Corporate reputation represents a core asset of companies and research has shown that better reputation can have positive effects such as increased revenues and sales. On the other hand, companies may suffer reputational damage that can result from internal or external and potentially unforeseen events such as operational losses. In this paper, we present an empirical analysis of how unforeseen...
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
The paper investigates method for the style breach detection task. We developed a method based on mapping sentences into high dimensional vector space. Each sentence vector depends on the previous and next sentence vectors. As main architecture for this mapping we use the pre-trained encoder-decoder model. Then we use these vectors for constructing an author style function and detecting outlier...
This paper aims to understand if, and to what extent, business details about an organization can help provide guidelines for better resource allocation across different preventive measures, in order to effectively protect, detect, and recover from, different forms of security incidents. Existing work on analyzing the distribution of risk across different incident categories, most notably Verizo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید