نتایج جستجو برای: nine weaknesses

تعداد نتایج: 221784  

2004
Ramón Salaverría

The events which occurred on 11 September 2001 were unprecedented in many ways. This article discusses how online newspapers reported on these events. Applying a descriptive methodology to a sample of 18 online newspapers from nine countries, this article analyses the strengths and weaknesses of online newspapers that could be seen that day. It shows the consolidation of the internet as an impo...

Journal: :Work 2015
Phillip D Rumrill Richard T Roessler Jian Li Katherine Daly Mykal Leslie

BACKGROUND The recent rehabilitation literature does not include a thorough assessment of the employment concerns of people with MS. OBJECTIVE This article presents descriptive findings from a national survey of the employment concerns of Americans with multiple sclerosis (MS; N = 1,924), representing nine chapters of the National Multiple Sclerosis Society. METHODS Respondents were asked t...

2004
Ramón Salaverría

The events which occurred on 11 September 2001 were unprecedented in many ways. This article discusses how online newspapers reported on these events. Applying a descriptive methodology to a sample of 18 online newspapers from nine countries, this article analyses the strengths and weaknesses of online newspapers that could be seen that day. It shows the consolidation of the internet as an impo...

2009
Juyun Cho

Conventional software development methods have gradually been replaced by lightweight agile software development methods since the mid-1990s. This phenomenon is mainly due to the conventional methods’ shortcomings, including a slow adaptation to rapidly changing business requirements, and a tendency to be over budget and behind schedule. This paper analyzes characteristics, strengths, and weakn...

Journal: :Babel – AFIAL : Aspectos de Filoloxía Inglesa e Alemá 1996

Journal: :Journal of the Japan Institute of Metals and Materials 1967

2011
Jay Eggert

This paper proposes a heterogeneous multi-core architecture where all of the cores share a single Instruction Set Architecture (ISA). The design is characterized by each of the heterogeneous cores representing a different point in the power/performance design space. They demonstrate, through modeling, that this is an effective mechanism to reduce power dissipation by means of dynamically switch...

2012
Leila Amgoud

This paper analyzes the ASPIC+ argumentation system. It shows that it is grounded on two monotonic logics which are not Tarskian ones. Moreover, the system suffers from five main problems: i) its logical formalism is ill-defined, ii) it may return undesirable results, iii) it builds on some counter-intuitive assumptions, iv) it violates some rationality postulates, and v) it allows counterintui...

2007
Christian Ullerich Andreas Westfeld

Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reducti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید