Listing 1 - 10 of 1524 | << page >> |
Sort by
|
Choose an application
Computers --- Access control --- Computer security --- Access control
Choose an application
Choose an application
Choose an application
Les bibliothèques sont-elles un lieu d'archivage, et si c'est le cas, qu'archivent-elles et comment le font-elles ? Cet ouvrage propose de discuter la pertinence des frontières convenues entre archives et bibliothèques, d'examiner dans la longue durée la construction des lieux de conservation documentaire et des fonctions, tantôt bien distinctes, tantôt plus hybrides, qui leur sont attribuées par les sociétés européennes. À partir d'études de cas, les seize contributions de ce volume retracent les circonstances dans lesquelles certains types de documents ont été considérés comme des archives et comment ils ont été répartis dans les dépôts d'archives ou dans les bibliothèques. Elles examinent les critères qui fondent cette distinction institutionnelle et documentaire, et la manière dont ces choix ont conditionné le travail de tri, de sélection, de classement, de description et de consultation. Elles invitent ainsi à réexaminer la genèse des fonds documentaires, au sein des familles, des institutions de l?État ou des cabinets d?érudits, et à comprendre autrement les conditions documentaires de la fabrique de l?histoire, hier et aujourd?hui.
Choose an application
Choose an application
This paper examines the effect of technological change and other factors on the relative demand for workers with different education levels and on the recent growth of U.S. educational wage differentials. A simple supply-demand framework is used to interpret changes in the relative quantities, wages, and wage bill shares of workers by education in the aggregate U.S. labor market in each decade since 1940 and from 1990 to 1995. The results suggest that the relative demand for college graduates grew more rapidly on average during the past 25 years (1970-95) than during the previous three decades (1940-70). The increased rate of growth of relative demand for college graduates beginning in the 1970s did not lead to an increase in the college/high school wage diffe- rential until the 1980s because the growth in the supply of college graduates increased even more sharply in the 1970s before returning to historical levels in the 1980s. The acceleration in demand shifts for more-skilled workers in the 1970s and 1980s relative to the 1960s is entirely accounted for by an increase in within-industry changes in skill utilization rather than between- industry employment shifts. Industries with large increases in the rate of skill upgrading in the 1970s and 1980s versus the 1960s are those with greater growth in employee computer usage, more computer capital per worker and larger investment as a share of total investment. The results suggest that the spread of computer technology may `explain' as much as 30-50% of the increase in the rate of growth of the relative demand for more-skilled workers since 1970.
Choose an application
We are pleased to welcome you to the Seventh ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet'17), held in conjunction with the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'17), in Miami Beach, USA on November 21 to 26, 2017. The Seventh ACM DIVANet'17 International Symposium aims to provide researchers and practitioners with a venue to disseminate and share state-of-the-art research on vehicular networks, intelligent transportation systems and wireless mobile ad hoc networking. Every paper submitted has been peerreviewed by at least two referees from the Technical Program Committee. We have received a large number of papers and due to the time limitation, we could only accommodate fifteen papers, which represent a 29% acceptance rate. Finally, we would like to thank the authors for their paper contributions and all the reviewers for their timely feedbacks. We hope you will find this program interesting and that the symposium provides you with a forum of discussion and an opportunity to share ideas with other researchers and specialists from around the world.
Choose an application
Choose an application
Three brief summaries of panel discussions and 28 papers cover the trusted computing base model, authorization and authentication, applications, security theory, ensuring assurance in mobile computing, architecture, intrusion detection and beyond, security in innovative new operating systems, and system vulnerability. Among specific topics are some weaknesses of the trusted computing base model, acceptable metrics of authentication, anonymous connections and onion routing, secure software architectures, local enforcement for global policies, surviving information warfare attacks on databases, research on proof- carrying code for untrusted-code security, and the possibility of evasive electronic espionage by deniable password snatching. No subject index. Annotation copyrighted by Book News, Inc., Portland, OR.
Choose an application
Listing 1 - 10 of 1524 | << page >> |
Sort by
|