Results 31 to 40 of about 2,449,057 (299)
Combining Approaches for Systemic Behaviour Change in Groundwater Governance
Over-extraction of groundwater is a prominent challenge in India, with profound implication for food security, livelihoods, and economic development. As groundwater is an ‘invisible’ and mobile common pool resource, sustainable governance of groundwater ...
Richu Sanil +3 more
doaj +1 more source
Securing Java with Local Policies. [PDF]
We propose an extension to the security model of Java, that allows for specifying, analysing and enforcing history-based usage policies. Policies are defined by usage automata, that recognize the forbidden execution histories. Programmers can sandbox an untrusted piece of code with a policy, which is enforced at run-time through its local scope.
M. Bartoletti +4 more
openaire +7 more sources
Defining Roles in Pediatric Palliative Care: Perspectives From Oncology and Palliative Care Teams
ABSTRACT Background Early integration of pediatric palliative care (PPC) is associated with improved symptom management, quality of life, and healthcare utilization for children with cancer. Despite this, variation persists in how PPC is understood, operationalized, and integrated within pediatric oncology programs. In particular, ambiguity surrounding
Leeat Granek +13 more
wiley +1 more source
Violent non-state actors' patterns of power: The case of Hezbollah [PDF]
Conventional International Relations emphasises the role of states as the primary actors, with control being the ultimate form of power. However, in today's interconnected and intricate global landscape, non-state actors, particularly violent non-state ...
Jaber Boushra
doaj +1 more source
The Hong Kong Pro-democracy Movement: Challenges and Divisions in the Past Decade [PDF]
This article is an attempt to examine the challenges to Hong Kong’s pro-democracy movement and the movement’s internal divisions in the past decade or so.
Joseph Yu-shek Cheng
doaj
Modeling Security Policy and the Effect for End-Users [PDF]
Many "good practices" in computer security are based on assumptions and local evidence that do not generalize. There are few quantifiable methods of establishing or refuting the validity of these practices from a user perspective.
Jones, K., Salako, K.
core +1 more source
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich +5 more
wiley +1 more source
Objectives Continuing medical education (CME) and work commitment are important for rural healthcare workers (RHWs) and rural medical work. The significant association between continuing education and work commitment has been reported in many studies ...
Jinlin Liu, Ying Mao
doaj +1 more source
Chinese Wall Security Policy [PDF]
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core +1 more source
Supporting Survivor‐Centered Care Through Digital Health Integration
ABSTRACT Survivors of childhood cancer face barriers to receiving guideline‐based, long‐term follow‐up care. Two digital tools, Passport for Care (PFC) and Cancer SurvivorLink (SurvivorLink), address complementary gaps by enabling tailored survivorship care plan (SCP) generation, updating, storage, and sharing.
Jordan G. Marchak +15 more
wiley +1 more source

