نتایج جستجو برای: in partial breach

تعداد نتایج: 17011741  

Journal: :Human factors 2017
Andrew Hampton Valerie L. Shalin

Objective This paper identifies general properties of language style in social media to help identify areas of need in disasters. Background In the search for metrics of need in social media data, much of the existing literature ignores processes of language usage. Psychological concepts, such as narrative breach, Gricean maxims, and lexical marking in cognition, may assist the recovery of disa...

Journal: :Journal of AHIMA 2009
Chris Dimick

The laptop was missing. Previously stationed in the EEG department of NorthShore University HealthSystem, the laptop had been connected to equipment used by staff to treat patients. Just who took the laptop from the Evanston, IL-based facility—an employee, patient, or visitor—was not known. What was known was that 250 patients had personal information stored on the machine, including their name...

Journal: :Computer Communications 2006
Ertan Onur Cem Ersoy Hakan Deliç

Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the number of sensors and the breach detection probability considering the effects of sensor parameters. We present the weakest breach path problem formulation and provide a solution by utilizing the Dijkstra’s shortest path ...

Journal: :Law and Contemporary Problems 1989

Journal: :Proceedings on Privacy Enhancing Technologies 2018

Journal: :Materials Today 2008

Journal: :Nature Physics 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید