نتایج جستجو برای: idm

تعداد نتایج: 613  

2017
Akram YM Sarhan Akram Y. Sarhan leszek T. Lilien Akram Sarhan Leszek Lilien

The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme ...

Journal: :Neuropharmacology 2009
Maria Grazia Rimoli Emilio Russo Mauro Cataldi Rita Citraro Paolo Ambrosino Daniela Melisi Annalisa Curcio Salvatore De Lucia Paola Patrignani Giovambattista De Sarro Enrico Abignente

It is presently unclear whether the antiseizure effects exerted by NSAIDs are totally dependent on COX inhibition or not. To clarify this point we investigated whether 7-methyl-2-phenylimidazo[1,2-b]pyridazine-3-carboxylic acid (DM1) and 6-methoxy-2-phenylimidazo[1,2-b]pyridazine-3-carboxylic acid (DM2), two imidazo[1,2-b]pyridazines structurally related to indomethacin (IDM) but ineffective in...

2017
Esther Pwa Talboom-Kamp Noortje A Verdijk Marise J Kasteleyn Lara M Harmans Irvin Jsh Talboom Mattijs E Numans Niels H Chavannes

BACKGROUND Worldwide, nearly 3 million people die of chronic obstructive pulmonary disease (COPD) every year. Integrated disease management (IDM) improves disease-specific quality of life and exercise capacity for people with COPD, but can also reduce hospital admissions and hospital days. Self-management of COPD through eHealth interventions has shown to be an effective method to improve the q...

2013
Anders Fongen Federico Mancini

The use of Identity Management (IdM) may leverage the trust in a distributed Publish-Subscribe (PubSub) system. An IdM provides mutual authentication between publishers, subscribers and message routers, enforces access control on message delivery and integrity control of message content. Access control is also a means to reduce traffic in a PubSub network since unauthorized message traffic will...

2007
SYLVIA ENCHEVA SHARIL TUMIN

Enterprise Identity Management (IDM) systems promise users to be equipped with a single enterprise identity and administrators with better users management environment. That increases security, provides the organizations with value-added data and money saving in user management. In fact, in order to do collaboration among independent organizations, each participant must first have a working IDM...

2005
Frank P. A. Coolen Thomas Augustin

A new model for learning from multinomial data has recently been developed, giving predictive inferences in the form of lower and upper probabilities for a future observation. Apart from the past observations, no information on the sample space is assumed, so explicitly no assumptions are made on the number of possible categories. In this paper, we briefly present the general lower and upper pr...

2002
Naohiro Matsumura Yukio Ohsawa Mitsuru Ishizuka

Promoting interactions among participants in an onlinecommunity is catching attention of web sites’ managers. In this paper, we first introduce Influence Diffusion Model (IDM), a method for discovering influential comments, participants and terms from threaded online discussions, and evaluate the performance by precision and recall measurement. Then we propose a new method for profiling of part...

Journal: :Journal of Direct, Data and Digital Marketing Practice 2013

2011
Rémi Delmas Thomas Polacsek David Doose Anthony Fernandes Pires

In the software systems field, we can consider that the generally understood goal of verification is to assess the compliance of a software with respect to the inputs and standards applying to a given phase in the design process, and that the goal of validation is to determine if the requirements are correct and complete, and is performed in the final system assessment phase. Nevertheless, the ...

2002
Li Ping Lihai Liu

Techniques using interleaving as the basic means for signal separation are introduced for both multiple access systems and multiple transmit antenna systems. For multiple access channels, the proposed interleave-division multiple-access (IDMA) scheme can achieve near capacity performance. For multiple antenna systems, the performance of the proposed interleave-division-multiplexing space-time (...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید