نتایج جستجو برای: nurse administrator

تعداد نتایج: 34701  

2004
A. Machì S. Lombardo Alberto Machì Saverio Lombardo

Today grid middleware is complex to be used, the development of grid-aware applications is errorprone and the Virtual Organization grid paradigm contrasts with traditional HPC optimisation strategies based on resource stability and known cost models of inter-node interaction patterns. The authors analyse several aspects of grid adaptivity, and identify 5 roles: the active resource/execution man...

2013
Harsh Mittal Manoj Jain Latha Banda

The project aim is to secure the network or a LAN by implementing such a software which is enable to carry out operations which are capable to monitor whole of the network ,sitting on one chair by viewing remote desktop ,passing messages to remote system and is also able to shut down the system by performing remote aborting operations . This software is purely developed in JAVA RMI (REMOTE METH...

1997
Wen-Shenq Juang Chin-Laung Lei

SUMMARY In this paper, we propose a practical and secure electronic voting scheme which meets the requirements of large scale general elections. This scheme involves voters, the administrator or so called the government and some scrutineers. In our scheme, a voter only has to communicate with the administrator three times and it ensures independence among voters without the need of any global c...

Journal: :J. Knowledge Management 2001
Charlotte Linde

This paper discusses the role of narrative in the expression and transmission of social knowledge as a specific type of tacit knowledge. Narrative is a central mechanism by which social knowledge is conveyed. Narrative provides a bridge between the tacit and the explicit, allowing tacit social knowledge to be demonstrated and learned, without the need to propositionalize it. Institutions can be...

Journal: :JIP 2013
Ichita Higurashi Akira Kanaoka Masahiko Kato Eiji Okamoto

Gaining complete understanding of the active services and open communication paths is often difficult because of the rapidly expanding complexity of those services and their wide-ranging functions. Furthermore, the IT administrators of hand-designed systems often lack ways to identify and close unnecessary services and communication pathways. In this paper, firstly we propose an automated appro...

2001
Arthur Fisher

Current authentication protocols (i.e. user login and password) successfully restrict access to properly configured workstations and servers. Traditionally, a user’s privileges will allow (or deny) access to files or applications on the local machine or on other machines within its domain. Yet, authorized access to a particular machine (or domain) does not necessarily correlate with access to p...

2008
Riza Aditya Byoungcheon Lee Colin Boyd Ed Dawson

Receipt-freeness is an essential security property in electronic voting to prevent vote buying, selling or coercion. In this paper, we propose an efficient mixnet-based receipt-free voting scheme by modifying a voting scheme of Lee et al. The receipt-freeness property is obtained through the randomization service given by a trusted administrator, and assuming that two-way untappable channel is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید