942 resultados para message dissemination


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Little is known of the uptake and use of knowledge disseminated in electronic formats, especially in Long Term Care (LTC) settings. The purpose of this descriptive study was to examine the dissemination of the BP Bloggers, a series of brief, evidence summaries designed to meet the knowledge needs of LTC staff. Guided by Rogers’ (2003) Diffusion of Innovations theory, the study documents dissemination of the BP Blogger and examines factors affecting dissemination, awareness, perceptions and its use. The survey of BP Blogger recipients was conducted electronically (n=114) online (n=10), by telephone (n=55), and print (n=144). Managers usually received the newsletter electronically while staff in LTC were more likely to receive printed copies. Participants disseminated the newsletter through paper, email, or posting in the workplace. Most participants rated the content, format, and usefulness of the BP Blogger as good or excellent. Time and lack of email access were barriers to dissemination.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mackenzie’s Toronto Weekly Message, July 16, 1859.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mackenzie’s Toronto Weekly Message, July 30, 1859.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

UANL

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Between 1700 and 1850, per-capita income doubled in Europe while falling in the rest of Eurasia. Neither geography nor economic institutions can explain this sudden divergence. Here the consequences of differences in communications technology are examined. For the first time, there appeared in Europe a combination of a standardized medium (national vernaculars with a phonetic alphabet) and a non-standardized message (competing religious, political and scientific ideas). The result was an unprecedented fall in the cost of combining ideas and burst of productivity-raising innovation. Elsewhere, decreasing standardization of the medium and increasing standardization of the message blocked innovation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Un fichier intitulé Charbonneau_Nathalie_2008_AnimationAnnexeT accompagne la thèse. Il contient une séquence animée démontrant le type de parcours pouvant être effectué au sein des environnements numériques développés. Il s'agit d'un fichier .wmv qui a été compressé.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Étude de cas / Case study

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cache look up is an integral part of cooperative caching in ad hoc networks. In this paper, we discuss a cooperative caching architecture with a distributed cache look up protocol which relies on a virtual backbone for locating and accessing data within a cooperate cache. Our proposal consists of two phases: (i) formation of a virtual backbone and (ii) the cache look up phase. The nodes in a Connected Dominating Set (CDS) form the virtual backbone. The cache look up protocol makes use of the nodes in the virtual backbone for effective data dissemination and discovery. The idea in this scheme is to reduce the number of nodes involved in cache look up process, by constructing a CDS that contains a small number of nodes, still having full coverage of the network. We evaluated the effect of various parameter settings on the performance metrics such as message overhead, cache hit ratio and average query delay. Compared to the previous schemes the proposed scheme not only reduces message overhead, but also improves the cache hit ratio and reduces the average delay