نتایج جستجو برای: private extension
تعداد نتایج: 247767 فیلتر نتایج به سال:
Agricultural extension services have been playing a central role in transformation process of agricultural sector in Nigeria but there are challenges which affect the quality of service delivery especially increasing cost of services and poor funding and therefore, promoting emergence of new extension strategies offered by private sector . The study investigated the perception of maize crop far...
Private higher education has been growing in South Africa, leading to intense concerns about its possible positive and negative effects in the fulfillment of broader goals. This article provides a comparative perspective, examining the experience of Latin American countries on the subject, first regarding the impact of the private sector on issues of access, equity, extension work, research and...
Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards ba...
The private industry in wildlife damage control is expanding into territory predominantly occupied by public agencies in the past. There is a potential for overlap and competition in services provided by the public and private sectors in Kansas. We examined wildlife damage control activity reports from the Cooperative Extension Service (CES), Kansas Department of Wildlife and Parks (IDWP), and ...
We describe a plugin extension to the Thunderbird Mail Client to support standardized evaluation of multiple spam filters on private mail streams. Researchers need not view or handle the subject users’ messages and subject users need not be familiar with spam filter evaluation methodology. All that is required of the user is to install the plugin as a standard extension and to run it on his or ...
This paper describes a 1-out-of-N oblivious transfer (OT) extension protocol with active security, which achieves very low overhead on top of the passively secure protocol of Kolesnikov and Kumaresan (Crypto 2011). Our protocol obtains active security using a consistency check which requires only simple computation and has a communication overhead that is independent of the total number of OTs ...
Although Radio Frequency IDentification (RFID) systems promise a fruitful future, security and privacy concerns have affected the adoption of the RFID technology. Several studies have been proposed to tackle the RFID security and privacy concerns under the assumption that the server is secure. In this paper, we assume that the server resides in the cloud that might be insecure, thus the tag’s d...
This document describes how to further extend the Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) extension [RFC4556] to exchange an opaque data blob which a KDC can validate to ensure that the client is currently in possession of the private key during a PKInit AS exchange.
Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation [1] and sharing classical secrets [2]. Realistic quantum states are noisy and their usefulness is only partially understood. Bound entangled states are central to this question—they have no distillable entanglement [3], yet sometimes still have a private classical key [4,...
The purpose of this paper is to derive extensions of the weak axiom of revealed preference (warp) to collective households. We consider three different settings: the general setting, where no information on the characteristics of goods is available; the private setting, where all goods are consumed privately without externalities, and finally, the dictator setting, where each observation is ful...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید