نتایج جستجو برای: despite all

تعداد نتایج: 2113259  

Journal: :IJWGS 2016
Salim Al-Ismaili Mengxiang Li Jun Shen Qiang He

Cloud computing is an emerging technology that promises competitive advantages, cost savings, enhanced business processes and services, and various other benefits to enterprises. Despite the rapid technological advancement, the adoption of cloud computing is still growing slowly among small and mediumsized enterprises (SMEs). This paper presents a model to support the decisionmaking process, us...

Journal: :Research in Computing Science 2017
Gil Hernández-Ledesma Erik G. Ramos Carlos Alberto Fernández y Fernández Jorge R. Aguilar-Cisneros Juan J. Rosas-Sumano Luis A. Morales-Ignacio

The development of an application based on a set of best software engineering practices involves first their selection. This process may become complex due to the variables involved. This paper presents an Operations Research approach for the selection of best software engineering practices for the development of applications or computational systems considering a series of alternatives and sel...

2016
Mike Sharples

The chapter examines seamless learning, where the aim is to enable a continuous fl ow of meaning-making despite changes in the physical and social context. One way to achieve this is by inducing a fl ow state such that learners are so engaged in a mobile learning activity that they lose awareness of their surroundings. Mobile educational games may be one way to achieve such fl ow, but this is n...

2017
Madelon L. Peters Elke Smeets Marion Feijge Gerard van Breukelen Gerhard Andersson Monica Buhrman Steven J. Linton

OBJECTIVES There is preliminary evidence for the efficacy of positive psychology interventions for pain management. The current study examined the effects of an internet-based positive psychology self-help program for patients with chronic musculoskeletal pain and compared it with an internet-based cognitive-behavioral program. MATERIALS AND METHODS A randomized controlled trial was carried o...

2005
Andrew D. Gordon Alan Jeffrey

A realistic threat model for cryptographic protocols or for languagebased security should include a dynamically growing population of principals (or security levels), some of which may be compromised, that is, come under the control of the adversary. We explore such a threat model within a pi-calculus. A new process construct records the ordering between security levels, including the possibili...

2013
Christopher Clement Audrey Lee-St. John Jessica Sidman

A bar-and-joint framework is a finite set of points together with specified distances between selected pairs. In rigidity theory we seek to understand when the remaining pairwise distances are also fixed. If there exists a pair of points which move relative to one another while maintaining the given distance constraints, the framework is flexible; otherwise, it is rigid. Counting conditions due...

Journal: :حکمت صدرایی 0

0

Journal: :Postgraduate Medical Journal 1979

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید