نتایج جستجو برای: unnecessary and unrealistic
تعداد نتایج: 16828342 فیلتر نتایج به سال:
DURING THE LAST FEW YEARS considerable interest has developed in the possibility that some of the myocardial damage consequent to coronary occlusion may be averted.' To explore this possibility there is a critical need for techniques capable of testing the hypothesis that a given intervention is capable of protecting ischemic myocardium. Since it has long been appreciated that myocardial ischem...
radial models of dea to measure the efficiency of dmus assumed an inefficient unit to be efficient must decrease (increase) proportional all inputs (outputs) as the same. this assumption is absolutely false, unnecessary and unrealistic, therefore, to address this deficiency, and raise awareness of how to use resources, it is so realistic that expect the various inputs have different efficiency....
Clinicians make many patient care decisions each day. The cumulative cognitive demand of these decisions may erode clinicians' abilities to resist making potentially inappropriate choices. Psychologists, who refer to the erosion of self-control after making repeated decisions as decision fatigue, 1,2 have found evidence that it affects nonmedical professionals. For example, as court sessions we...
Following Weinstein's (1980) pioneering work many studies established that people have an optimistic bias concerning future life events. At first, the bulk of research was conducted using populations in North America and Northern Europe, the optimistic bias was thought of as universal, and little attention was paid to cultural context. However, construing unrealistic optimism as a form of self-...
Despite numerous efforts extolling the virtues of formal modeling (Epstein 2008; Schank 2001; Smith & Conrey 2007; Marewksi & Olsson 2009; Farrell & Lewandowsky 2010; Weinhardt & Vancouver 2012; Smaldino et al. 2015), there remains widespread resistance among social and behavioral scientists to adopt formal modeling in their general research approach. In addition to the technical challenge pose...
Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today’s research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید