نتایج جستجو برای: Private

تعداد نتایج: 100146  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یاسوج - دانشکده ادبیات و علوم انسانی 1392

the effect of learning strategies on the speaking ability of iranian students in the context of language institutes abstract language learning strategies are of the most important factors that help language learners to learn a foreign language and how they can deal with the four language skills specifically speaking skill effectively. acknowledging the great impact of learning strategies...

2002
Raouf Boutaba

irtual Private Network (VPN) is one of the major trends in the integrated broadband communications environment. There is a myriad of definitions of a VPN used in the networking community to describe a broad set of problems and solutions. In [1], Ferguson et al. define a VPN as a communications environment in which access is controlled to permit peer connections only within a defined community o...

2002
Päivi Kallio Jarkko Holappa Pavel Ivanchev

Attacks against the information flowing on the Internet cause a serious security threat nowadays, and force the developers to consider the system security aspects. This paper presents the use and suitability of Virtual Private Networks (VPNs) in the prevention of security breaches. An Open Service Gateway Initiative (OSGi) platform is presented and integration with VPN is studied as a case stud...

2015
Gail Truman Jaime Henderson

This poster session describes the selection criteria and process used for evaluating three repository software offerings and cloud platforms, with pros and cons. It describes implementation of workflows, representations of PREMIS metadata for objects in the repository, documenting fixity checks performed on datastreams, mapping of “rights” elements in DC datastreams to PREMIS “rightsExtension” ...

2002
Nikos Manouselis Demetrios Sampson

In this paper, we present a multi-criteria decision aid methodology optimizing the performance of Service Provider Agents in a Virtual Private Network, according to the Specifications posed by the Foundation for Intelligent Physical Agents (FIPA). We enhance the basic protocol steps for a service brokering procedure, and apply the methodology to a specific case of Network Providers: the Interne...

Journal: :RFC 2005
Benson Schliesser Thomas D. Nadeau

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes Textual ...

2003
Gustav Rosenbaum William Lau Sanjay Jha

VPN services has been around for decades but it did not get wide-spread usage until recently. A combination of new VPN technologies, network technologies and business communication requirements are the driving force behind the VPN services. This survey gives an overview of the recent approaches of VPN solutions and compare their scalability and flexibility aspects. The survey also categorises V...

Journal: :Telematics and Informatics 2014
Cheng-Yuan Ku Pei-Chen Sung Wen-Huai Hsieh

Although the policy of the separation of dispensing from the medical practice (SDMP) has been promoted by the Department of Health (DOH) in Taiwan for many years, it has never been significantly successful. Instead of transferring prescriptions to the insurance-contracted pharmacy (ICP) in the community, most of the patients still fill their prescriptions in the hospital or clinic. This is beca...

2002
Michael Altenhofen Joachim Schaper

This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. More specifically this paper focuses on a new approach of meta-tagging learning elements to enable the flexible execution of courses depending on the individual learning style of the student. The notion of a content ag...

Journal: :CoRR 2013
Osuolale Abdulrahamon Tiamiyu

Though objectives of trusted routing and virtual private networks (VPN) data transfer methods are to guarantee data transfer securely to from senders to receivers over public networks like Internet yet there are paramount differences between the two methods. This paper analyses their differences.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید