نتایج جستجو برای: full transferfull access

تعداد نتایج: 597653  

Journal: :Indian Journal of Dermatology, Venereology and Leprology 2005

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1390

این پژوهش یک بررسی بین زبانی پیرامون فراگیری بندهای موصولی زبان انگلیسی توسط فراگیران فارسی زبان است. با مقایسه ی ساختار بندهای موصولی فارسی و انگلیسی دو تفاوت عمده مشخص شدند: نشانه موصولی مورد استفاده و امکان استفاده از ضمایر تکراری. ابزارهای مورد استفاده در این تحقیق یک آزمون ترجمه برای سنجش تولید و یک آزمون قضاوت دستوری برای سنجش درک بندهای موصولی انگلیسی بودند. 81 دانشجوی رشته ی زبان انگلیس...

Journal: :Computer Networks 2011
Damien Leroy Gregory Detal Julien Cathalo Mark Manulis François Koeune Olivier Bonaventure

The fast increase of mobile Internet use motivates the need for WiFi sharing solutions, where a mobile user connects to the Internet via a nearby foreign network while its home network is far away. This situation creates security challenges which are only partially solved by existing solutions like VPNs. Such solutions neglect the security of the visited network, and private users or organizati...

1999
Junchen Du George Warner Erik J. Vallow Penny E. Breyer Tom L. Hollenbach

An implementation of GSM EFR using traditional single MAC DSPs (DSP1600) takes 24 MIPS to run a single speech channel. Lucent DSP16000 is a dual MAC high performance DSP. Analysis has shown DSP16000 code can run GSM EFR at 10 MIPS per channel with the same program space as DSP1600. The code has been re-structured to minimize delays and RAM usage for multi-channel TRAU applications. For a 100 MI...

Journal: :Future Internet 2017
Jiang Wu Zhou Lei Shengbo Chen Wenfeng Shen

With the rapid development of Internet, the traditional computing environment is making a big migration to the cloud-computing environment. However, cloud computing introduces a set of new security problems. Aiming at the virtual machine (VM) escape attack, we study the traditional attack model and attack scenarios in the cloud-computing environment. In addition, we propose an access control mo...

2010
José Luis Salazar Héctor Valdés-González Francisco Cubillos Andres Bello

Modelling and simulation of semi-autogenous (SAG) mills are valuable tools for helping to design control laws for a given application and subsequently to optimise its performance and process control. SAG mills (see Figure 1) are presently one of the most widely used alternatives in the field of mineral size reduction as a result of their advantages such as higher processing capacity, lower phys...

2010
Jan Kasprzak Michal Brandejs Matěj Čuhel Tomáš Obšívač

One of the toughest problems to solve when deploying an enterprise-wide full-text search system is to handle the access rights of the documents and intranet web pages correctly and effectively. Post-processing the results of general-purpose fulltext search engine (filtering out the documents inaccessible to the user who sent the query) can be an expensive operation, especially in large collecti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید