نتایج جستجو برای: in partial breach
تعداد نتایج: 17011741 فیلتر نتایج به سال:
Adversary: Somebody who, whether intentionally or not, reveals sensitive, private information Adversarial model: Formal description of the unique characteristics of a particular adversary Attribute disclosure: A privacy breach wherein some descriptive attribute of somebody is revealed Identity disclosure: A privacy breach in which a presumably anonymous person is in fact identifiable k-P-anonym...
cement is an essential ingredient in the concrete buildings. for production of cement considerable amount of fossil fuel and electrical energy is consumed. on the other hand for generating one tone of portland cement, nearly one ton of carbon dioxide is released. it shows that 7 percent of the total released carbon dioxide in the world relates to the cement industry. considering ecological issu...
Statistical evaluation of historical dike failure mechanism The failure mechanism of flood protection dikes includes physical (geotechnical, seepage) processes leading to a dike breach. An awareness of the failure mechanism is required directly in dike stability calculations and indirectly for risk calculations. Statistics of historical data indicate among others the distribution and frequency ...
Coverage is an important issue in Wireless Sensors Networks (WSNs). It gives a measure of the quality of surveillance a WSN provides over a field it is designed to monitor. Different measures of coverage capture different aspects of surveillance. In this paper, we study two measures of coverage maximal breach/support, and all-pairs average maximal breach/support. The geometric characterisation ...
Breach remedies serve an important role in protecting relationship-specific investments. The theoretical literature predicts that some commonly used types of breach remedies may protect too well, in the sense that they induce overinvestment. The driving forces behind this result are the complete insurance against potential separation that breach remedies may provide, and the possibility to prev...
Information security controls can help reduce the probability of a breach, but cannot guarantee that one will not occur. In order to reduce the costs of data breaches, firms are faced with competing alternatives. Investments in ex ante security measures can help prevent a breach, but this is costly and may be inefficient; ex post mitigation efforts can help reduce losses following a breach, but...
the present paper offers a postcolonial reading of two of the best novels by v. s. naipaul – half a life and the mimic men – in five chapters. the focus of this research is on different notions of postcolonial criticism and their application on the two novels as discussed from homi bhabha’s and frantz fanons points of view. having introduced the life and literary career of v. s. naipaul in th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید