نتایج جستجو برای: private

تعداد نتایج: 100146  

2002
Thomas L. Wolfe Yih-Chiao Joseph Liu Hsin-Ping Pat Chang

Many organizations are discovering the need to protect themselves with isolation routers, Jirewalls, and other technologies. Simultaneously they are collaborating more and more with external organizations. When local services and resources must be shared externally, problems arise. There are many approaches to these problems. For example, a Virtual Private Network (VPN) can provide external use...

Journal: :international journal of health policy and management 0
solomon salve department of global health and development, london school of hygiene and tropical medicine, london, uk kabir sheikh public health foundation of india, new delhi, india john dh porter departments of clinical research and global health and development, london school of hygiene and tropical medicine, london, uk

background public and private health sectors both play a crucial role in the health systems of low- and middleincome countries (lmics). the tuberculosis (tb) control strategy in india encourages the public sector to actively partner with private practitioners (pps) to improve the quality of front line service delivery. however, ensuring effective and sustainable involvement of pps constitutes a...

2005
T. Madsen

The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the...

1993
Jay M. Hyman Aurel A. Lazar Giovanni Pacifici

We introduce a methodology for establishing a connection between two nodes of a broadband network, that allows for securing sufficient resources at every intermediate node along the selected route, and thereby guarantee Quality of Service. We describe how a Virtual Path (VP) mechanism may be implemented within our framework, and compare the performance achieved by such a scheme with that of a V...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم بهزیستی و توانبخشی - پژوهشکده علوم بهزیستی 1391

پژوهش حاضر به منظور مقایسه اختلالات رفتاری کودکان بی سرپرست و بدسرپرست 7 تا 12 سال مراکز نگهداری شبانه روزی دولتی و خصوصی شهر تهران انجام شده است. روش: روش تحقیق از نوع علی مقایسه ای و جامعه آماری مورد مطالعه کودکان بی سرپرست و بدسرپرست 12-7 ساله مراکز شبانه روزی تهران بودند. نمونه گیری به شیوه تمام شماری انجام شد و وضعیت 128 کودک ساکن مراکز شبانه روزی دولتی و خصوصی که دارای شرایط ورود به پژوه...

Journal: :international journal of architecture and urban development 2014
abraham adeniyi taiwo taiwo albert adeboye peter adewuyi aderonmu

events in the building industry in nigeria in the last decade show the important role the private sector played in housingfinance. with the advent of the public-private partnership concept in almost every sector of the socio-economic spheresof the nation, the role of the private sector in housing finance cannot be over-emphasized. this paper clearly states thatthe low-income public servants do ...

Journal: :Int. Journal of Network Management 2009
Jing Wu Michel Savoie Scott Campbell Hanxi Zhang

A Layer 1 Virtual Private Network (L1-VPN) has two models for service management: the resource-partition based model and the domain-service based model. In this paper, we present a network management tool for resourcepartition based L1-VPNs. A Transaction Language One (TL1) proxy is designed to achieve resource partitioning at the network element level. Building on top of a TL1 proxy, we implem...

2010
Sarantos Psycharis

In this paper we present a model of e-learning suitable for teacher training sessions. The main purpose of our work is to define the components of the educational system which influences the successful adoption of e-learning in the field of education. We also present the factors of the readiness of e-learning mentioned in the literature available and classifies them into the 3 major categories ...

2003
Gustav Rosenbaum William Lau Sanjay Jha

VPN services have been available for decades but not widely used until recently. A combination of new VPN technologies, network technologies and business communication requirements is the driving force behind the take-up of VPN services. This paper gives an overview of recent VPN solutions and analyses their scalability and flexibility. VPN solutions are categorized and related to potential cus...

2004
Sylvain Hallé Rudy Deca Omar Cherkaoui Roger Villemaire Daniel Puche

Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate and commit, which currently lack a clear description and an information model. We propose in this paper a model for validation based on XML schema trees. By using an existing logical formalism called TQL, we express imp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید