نتایج جستجو برای: as a private domain

تعداد نتایج: 14059163  

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

Journal: :IACR Cryptology ePrint Archive 2016
Ania M. Piotrowska Jamie Hayes Nethanel Gelernter George Danezis Amir Herzberg

AnoNotify is a service for private, timely and low-cost online notifications. We present the design and security arguments behind AnoNotify, as well as an evaluation of its cost. AnoNotify is based on mixnetworks, Bloom filters and shards. We present a security definition and security proofs for AnoNotify. We then discuss a number of applications, including notifications for incoming messages i...

2014
Ayoub BAHNASSE Najib EL KAMOUN

The simulation of large-scale networks is a challenging task especially if the network to simulate is the Dynamic Multipoint Virtual Private Network, it requires expert knowledge to properly configure its component technologies. The study of these network architectures in a real environment is almost impossible because it requires a very large number of equipment, however, this task is feasible...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1392

abstract while task-based instruction is considered as the most effective way to learn a language in the related literature, it is oversimplified on various grounds. different variables may affect how students are engaged with not only the language but also with the task itself. the present study was conducted to investigate language and task related engagement on the basis of the task typolog...

2001
Reinhard Ruppelt Andrei Pelinescu Cristian Constantin John Floroiu Dorgham Sisalem Berthold Butscher

Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security mechanisms can be integrated with Mobile IP to create a mobile VPN. In this context, this work describes a prototype implementation of an integrated environment for secure, inter-domain, mobile communications for an exis...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1391

nowadays enhancing critical thinking in learners is considered one of the foreign language teachers’ tasks due to its high position in foreign language classrooms. when it comes to selecting materials for language classrooms, there are obviously some criteria that teachers should apply. the present study aimed at a critical thinking based analysis of ten picture story books and ten folktales th...

Journal: :RFC 2007
Chris Metz Luca Martini Florin Balus Jeff Sugimoto

The signaling protocols used to establish point-to-point pseudowires include type-length-value (TLV) fields that identify pseudowire endpoints called attachment individual identifiers (AIIs). This document defines AII structures in the form of new AII TLV fields that support AII aggregation for improved scalability and Virtual Private Network (VPN) auto-discovery. It is envisioned that this wou...

1996
David Lewis Lennart H. Bjerring Ingi H. Thorarensen

The evolution of an open market for telecommunication services provides a wide range of opportunities for the provision of value added services by providers other than public network operators. One service already available today is that of a Virtual Private Network that provide dispersed corporate sites with wide area data and telephony capabilities using public network services. The introduct...

2005
Laura Serrano Miguel Angel Sotos

The main objective of emergent standard Virtual Private LAN Service (VPLS) is the interconnection of users located at different geographic locations as if they were in the same local area network. In this sense, the investigations and tests that have been done are mainly focused on point-to-point interconnection scenarios using Virtual Private Networks (VPNs), as there have been few tests done ...

Journal: :فقه و حقوق خانواده 0
فائزه عظیم زاده اردبیلی استادیار گروه فقه و حقوق اسلامی دانشگاه امام صادق (ع) پردیس خواهران زهرا میرزازاده دانش‏آموخته کارشناسی ارشد حقوق خانواده دانشگاه امام صادق(ع) پردیس خواهران

as a private domain, the family is subordinate to the characteristics of private law. on the other hand, as the only major authority, the government has the responsibility of supporting all individuals by resorting to civil and criminal law. however, by taking the public aspect of the criminal law into consideration, its basis is on the lack of need of its presence when facing the family, the b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید