نتایج جستجو برای: nurse administrator
تعداد نتایج: 34701 فیلتر نتایج به سال:
Today grid middleware is complex to be used, the development of grid-aware applications is errorprone and the Virtual Organization grid paradigm contrasts with traditional HPC optimisation strategies based on resource stability and known cost models of inter-node interaction patterns. The authors analyse several aspects of grid adaptivity, and identify 5 roles: the active resource/execution man...
The project aim is to secure the network or a LAN by implementing such a software which is enable to carry out operations which are capable to monitor whole of the network ,sitting on one chair by viewing remote desktop ,passing messages to remote system and is also able to shut down the system by performing remote aborting operations . This software is purely developed in JAVA RMI (REMOTE METH...
SUMMARY In this paper, we propose a practical and secure electronic voting scheme which meets the requirements of large scale general elections. This scheme involves voters, the administrator or so called the government and some scrutineers. In our scheme, a voter only has to communicate with the administrator three times and it ensures independence among voters without the need of any global c...
This paper discusses the role of narrative in the expression and transmission of social knowledge as a specific type of tacit knowledge. Narrative is a central mechanism by which social knowledge is conveyed. Narrative provides a bridge between the tacit and the explicit, allowing tacit social knowledge to be demonstrated and learned, without the need to propositionalize it. Institutions can be...
Gaining complete understanding of the active services and open communication paths is often difficult because of the rapidly expanding complexity of those services and their wide-ranging functions. Furthermore, the IT administrators of hand-designed systems often lack ways to identify and close unnecessary services and communication pathways. In this paper, firstly we propose an automated appro...
Current authentication protocols (i.e. user login and password) successfully restrict access to properly configured workstations and servers. Traditionally, a user’s privileges will allow (or deny) access to files or applications on the local machine or on other machines within its domain. Yet, authorized access to a particular machine (or domain) does not necessarily correlate with access to p...
Receipt-freeness is an essential security property in electronic voting to prevent vote buying, selling or coercion. In this paper, we propose an efficient mixnet-based receipt-free voting scheme by modifying a voting scheme of Lee et al. The receipt-freeness property is obtained through the randomization service given by a trusted administrator, and assuming that two-way untappable channel is ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید