Results 111 to 120 of about 981,793 (347)

Russian Cryptographic Algorithms in the Identity Management Systems

open access: yesБезопасность информационных технологий, 2011
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj  

An assessment of consumers’ subconscious responses to frontline employees’ attractiveness in a service failure and recovery situation

open access: yesSouth African Journal of Economic and Management Sciences, 2017
Background: Initial analyses of the impact of physical attractiveness in a business context have supported the ‘what is beautiful is good’ contention. However, in circumstances characterised by negative emotions, duress and stress, very little is known ...
Christo Boshoff
doaj   +1 more source

An optimized protocol to detect high‐throughput DNA methylation from custom targeted sequences on 96 samples simultaneously

open access: yesFEBS Open Bio, EarlyView.
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli   +4 more
wiley   +1 more source

Internet Service Provider Liability for Contributory Trademark Infringement After Gucci [PDF]

open access: yes, 2002
[I]f a manufacturer or distributor intentionally induces another to infringe a trademark, or if it continues to supply its product to one whom it knows or has reason to know is engaging in trademark infringement, the manufacturer or distributor is ...
Walsh, Gregory C.
core   +1 more source

Service Provider Revenue Dependence of Offered Number of Service Classes [PDF]

open access: yesTelfor Journal, 2011
In this paper possible applications of responsive pricing scheme and Stackelberg game for pricing telecommunication services with service provider as a leader and users acting as followers are analyzed. We have classified users according to an elasticity
V. S. Aćimović-Raspopović   +1 more
doaj  

Teaching Python with team‐based learning: using cloud‐based notebooks for interactive coding education

open access: yesFEBS Open Bio, EarlyView.
This study presents a novel approach to teaching Python and bioinformatics using team‐based learning and cloud‐hosted notebooks. By integrating interactive coding into biomedical education, the method improves accessibility, student engagement, and confidence—especially for those without a computing background.
Nuno S. Osório, Leonardo D. Garma
wiley   +1 more source

Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom Service Management

open access: yes, 2011
To optimize telecom service management, it is necessary that information about telecom services is highly related to the most popular telecom service. To this end, we propose an algorithm for mining target-oriented fuzzy correlation rules. In this paper,
Chueh, Hao-En
core   +3 more sources

Experiences and challenges of pre-exposure prophylaxis initiation and retention among high-risk populations: qualitative insights among service providers in Thailand

open access: yesFrontiers in Public Health
ObjectivesPre-exposure prophylaxis (PrEP) has been an essential element of the national combination prevention package and included in the Universal Health Coverage (UHC) of Thailand since 2019.
Ajaree Rayanakorn   +6 more
doaj   +1 more source

Penerapan Metode Analytical Hierarchy Process (AHP) Sebagai Pendukung Keputusan dalam Menentukan Internet Service Provider Terbaik di Pangkalpinang

open access: yesJurnal Sisfokom, 2016
Internet service provider used in today's rapidly growing with a wide selection of advantages and disadvantages. Because it was so many criteria - criteria that can be used as a basic internet service providers the most suitable to be applied in the ...
Yogi Prihartono, Hilyah Magdalena
doaj   +1 more source

Home - About - Disclaimer - Privacy