نتایج جستجو برای: private extension service

تعداد نتایج: 560141  

1998
Geoff Huston

The term "VPN," or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking tec...

1998
Paul Ferguson Geoff Huston

The term “VPN,” or Virtual Private Network, has become almost as recklessly used in the networking industry as has "QoS" (Quality of Service) to describe a broad set of problems and "solutions," when the objectives themselves have not been properly articulated. This confusion has resulted in a situation where the popular trade press, industry pundits, and vendors and consumers of networking tec...

Journal: :journal of agricultural science and technology 2013
j. ali

this paper aims at analyzing farmers’ responses on quality of agricultural information services provided by public and private sources. the study is based on primary survey of 461 farmers in eight districts of uttar pradesh, india, using a structured questionnaire. farmers’ responses on quality of agricultural information services from public and private sources were analyzed using analysis of ...

Journal: :The Computer Science Journal of Moldova 2008
Nina Taslaman

In 1993 Koblitz and Fellows proposed a public key cryptosystem, Polly Cracker, based on the problem of solving multivariate systems of polynomial equations, which was soon generalized to a Gröbner basis formulation. Since then a handful of improvements of this construction has been proposed. In this paper it is suggested that security, and possibly e ciency, of any Polly Cracker-type cryptosyst...

2000
Andrew Cotton

The extension of the mains to marginal urban areas does indeed require considerable investment and implies supplying disadvantaged population groups whose ability to pay presents significant collection problems (Lyonnaise des Eaux, Lyonnaise des Eaux also suggests the use of order of priority within contracts, in order to prioritise services in the order of most pressing need, as follows (Lyonn...

The study investigated the constraints to farmers’ intention to pay for private irrigation in Nandom District, Ghana. Using a key informant interviews and semi-structured questionnaires, the study collected data from 236 farmers. Data was analyzed with descriptive and inferential statistics. Kendall coefficient of concordance was used to determine the level of agreement among farmers in ranking...

The main objective of this research is to investigate the comparative effect of knowledge management strategy on the service innovation performance in public and private hospitals through the mediating role of knowledge management practices. Drawing in knowledge management theory, all the organizations require a suitable knowledge management strategy to perform successfully. Therefore, this res...

Journal: :Journal of Agricultural Extension and Rural Development 2021

A cross-sectional study was undertaken to examine the aquaculture extension service in Kenya.  Primary data collected using a semi-structured questionnaire administered 292 randomly selected fish farmers and 56 officers different counties Kenya. Descriptive statistics mainly mean frequencies were computed determine key characteristics of officers. Inferential done Chi-Square test goodness ...

The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...

Journal: :PoPETs 2015
Nikita Borisov George Danezis Ian Goldberg

Users of social applications like to be notified when their friends are online. Typically, this is done by a central server keeping track of who is online and offline, as well as of all of the users’ “buddy lists”, which contain sensitive information. We present DP5, a cryptographic service that implements online presence indication in a privacy-friendly way. DP5 allows clients to register thei...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید