نتایج جستجو برای: in partial breach

تعداد نتایج: 17011741  

2014
Sean Chester Bruce M. Kapron Gautam Srivastava Srinivasan Venkatesh Alex Thomo

Adversary: Somebody who, whether intentionally or not, reveals sensitive, private information Adversarial model: Formal description of the unique characteristics of a particular adversary Attribute disclosure: A privacy breach wherein some descriptive attribute of somebody is revealed Identity disclosure: A privacy breach in which a presumably anonymous person is in fact identifiable k-P-anonym...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

cement is an essential ingredient in the concrete buildings. for production of cement considerable amount of fossil fuel and electrical energy is consumed. on the other hand for generating one tone of portland cement, nearly one ton of carbon dioxide is released. it shows that 7 percent of the total released carbon dioxide in the world relates to the cement industry. considering ecological issu...

Journal: :The Lancet 1837

2012
L. NAGY

Statistical evaluation of historical dike failure mechanism The failure mechanism of flood protection dikes includes physical (geotechnical, seepage) processes leading to a dike breach. An awareness of the failure mechanism is required directly in dike stability calculations and indirectly for risk calculations. Statistics of historical data indicate among others the distribution and frequency ...

2008
Anirvan DuttaGupta Arijit Ghosh Arijit Bishnu Indranil Sengupta

Coverage is an important issue in Wireless Sensors Networks (WSNs). It gives a measure of the quality of surveillance a WSN provides over a field it is designed to monitor. Different measures of coverage capture different aspects of surveillance. In this paper, we study two measures of coverage maximal breach/support, and all-pairs average maximal breach/support. The geometric characterisation ...

2000
Randolph Sloof Edwin Leuven Hessel Oosterbeek Joep Sonnemans

Breach remedies serve an important role in protecting relationship-specific investments. The theoretical literature predicts that some commonly used types of breach remedies may protect too well, in the sense that they induce overinvestment. The driving forces behind this result are the complete insurance against potential separation that breach remedies may provide, and the possibility to prev...

2017
Veronica Marotta Sasha Romanosky

Information security controls can help reduce the probability of a breach, but cannot guarantee that one will not occur. In order to reduce the costs of data breaches, firms are faced with competing alternatives. Investments in ex ante security measures can help prevent a breach, but this is costly and may be inefficient; ex post mitigation efforts can help reduce losses following a breach, but...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

the present paper offers a postcolonial reading of two of the best novels by v. s. naipaul – half a life and the mimic men – in five chapters. the focus of this research is on different notions of postcolonial criticism and their application on the two novels as discussed from homi bhabha’s and frantz fanons points of view. having introduced the life and literary career of v. s. naipaul in th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید