نتایج جستجو برای: security arrangements

تعداد نتایج: 198305  

Journal: :Eur. J. Comb. 1998
Christos A. Athanasiadis

There has been considerable interest in the past in analyzing specific families of hyperplane arrangements from the perspective of freeness. Examples of such families have primarily included classes of subarrangements of Coxeter arrangements. The subarrangements of the braid arrangement An , the Weyl arrangement of type An−1, are known as the graphical arrangements. They correspond naturally to...

1995

ments under new stand-by arrangements for 19 countries (along with augmentation of access under existing arrangements for 2 other countries), extended arrangements for 4 countries, new ESAF arrangements for 8 countries (with access under ESAF arrangements being increased for 3 other countries), one new SAF arrangement , as well as one drawing under the compensatory and contingency financing fac...

Journal: :Philosophical transactions. Series A, Mathematical, physical, and engineering sciences 2013
Dustin Garrick Lucia De Stefano Fai Fung Jamie Pittock Edella Schlager Mark New Daniel Connell

Hydroclimatic risks and adaptive capacity are not distributed evenly in large river basins of federal countries, where authority is divided across national and territorial governments. Transboundary river basins are a major test of federal systems of governance because key management roles exist at all levels. This paper examines the evolution and design of interstate water allocation instituti...

Journal: :Quality & safety in health care 2004
A Rogers A Kennedy E Nelson A Robinson

BACKGROUND Improving access is a key policy issue in improving quality of care and extending patient choice and participation. People's experience of changing from fixed outpatient appointments to more flexible direct access arrangements for chronic disease has been underexplored. OBJECTIVES To examine patients' views on using an open system of access compared with fixed outpatient appointmen...

Journal: :Journal of International Cooperation and Development 2022

This study related to the importance of information and technology in today's global business. The nature systems also exposes them threats which make prone security breaches. Information risks are several internal external, making it almost impossible for only professionals handle. therefore reinforces need involve end-users by educating be aware threats, their role curbing those threats. Rela...

Journal: :Electr. J. Comb. 2016
Torsten Hoge Gerhard Röhrle

The aim of this note is a classification of all nice and all inductively factored reflection arrangements. It turns out that apart from the supersolvable instances only the monomial groups G(r, r, 3) for r > 3 give rise to nice reflection arrangements. As a consequence of this and of the classification of all inductively free reflection arrangements from Hoge and Röhrle (2015) we deduce that th...

Journal: :Advances in Mathematics 1998

Journal: :The Electronic Journal of Combinatorics 2008

Journal: :Topology and its Applications 2018

Journal: :Alexandria Engineering Journal 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید