نتایج جستجو برای: needs a key variable

تعداد نتایج: 13537780  

Journal: :علوم تربیتی 0
محمود بحرانی غلامرضا رجبی

this research aimed to study of the effects of classroom goal structures on students’ psychological wellbeing with respect to the mediating role of self-efficacy and basic psychological needs. in this regard, the effects of performance and mastery goal structure as exogenous variables with self-efficacy and basic psychological needs as mediating variables on wellbeing were tested through a hypo...

2005
Jonathan Katz Philip D. MacKenzie Gelareh Taban Virgil D. Gligor

Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, an inherent limitation of this approach (assuming low-entropy passwords are used) is that the user’s password is exposed if this server is ever compromised. To address this issue, a number of schemes have been proposed ...

Journal: :Security and Communication Networks 2015
Lein Harn Guang Gong

In 1992, a non-interactive k-secure m-conference protocol based on an m-variate polynomial has been proposed. Each user needs to store a (m 1)-polynomial having degree k as a private share. A secret conference key involving m users can be computed by each conference member non-interactively using each private share. There is no overhead to exchange information in order to establish a conference...

1998
Scott Craver

The so-called prisoners’ problem, in which two individuals attempt to communicate covertly without alerting a “warden” who controls the communications channel, has taken a number of forms, adorned with various assumptions or requirements which make the problem more or less difficult. One assumption which makes the problem considerably more managable is that the participants are allowed to share...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

abstract: about 60% of total premium of insurance industry is pertained?to life policies in the world; while the life insurance total premium in iran is less than 6% of total premium in insurance industry in 2008 (sigma, no 3/2009). among the reasons that discourage the life insurance industry is the problem of adverse selection. adverse selection theory describes a situation where the inf...

2006
Orland Hoeber Xue Dong Yang

The interaction model supported by web search engines has changed very little since the early days of web search. Users are required to formulate their queries with very little support from the system, and are provided with a list-based representation of the web search results that promotes a sequential evaluation of the document surrogates. The short queries used by web searchers, and the few ...

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده ادبیات و زبانهای خارجی 1393

abstract this mixed method study examines whether there is any relationship among the variables of the study (job satisfaction, social capital and motivation). the researcher considered job satisfaction and social capital as independent variables; motivation is the dependent variable of the study. the researcher applied a questionnaire to assess each variable. to measure efl teachers’ job sati...

Journal: :Journal of Computer Security 2010
Massimiliano Pala Sean W. Smith

Public key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a Public Key Infrastructure (PKI). PKIs have become a central asset for many organizations, due to distributed IT and users. Even though the usage of PKIs in closed and controlled environments is quite common, interoperability a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید