A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Equity of access to health care: outlining the foundations for action
2004
Journal of Epidemiology and Community Health
ACKNOWLEDGEMENTS We are indebted to Julian Le Grand and Walter Holland for their comments on previous drafts of this article. ...
in the field have more carefully defined access to health care, at a general level, as entailing the ability to secure a specified set of healthcare services, at a specified level of quality, subject ...
6 but there are currently no generally accepted definitions of access and need. ...
doi:10.1136/jech.2003.017731
pmid:15252067
pmcid:PMC1732867
fatcat:c3los7qnzbf5lkm2r6zmbejope
How can flicker level be determined before a customer is connected to the electric grid
2009
2009 IEEE Power & Energy Society General Meeting
Based on planning level Pst plMV at this PCC, the highest emission limit Psti_high of the new installation should be defined by IEC summation law: possibility of acceptance of higher emission levels on ...
a conditional basis IEC Stage 3 concerns the possibility of acceptance of higher emission levels on a conditional basis, i.e. all exception cases where the connection conditions can't be met by studies ...
doi:10.1109/pes.2009.5276016
fatcat:nuhq4le54rgxvfmrcvtmosxrcq
One approach in definition of acceptable level of risk for slopes in hard rocks
2018
ce/papers
In the frame of this article are presented the basics of one approach that shows how is possible to link the acceptable level of risk with the values of Factor of Safety or Probability of Failure. ...
Based on these analyses, the article gives some new proposals in definition of acceptable (tolerable) level of risks using also criteria of probability of failure, potential loss of life and economic impacts ...
(SF), Probability of Failure (PF) as well as to define Acceptable Level of Risk (ALR). ...
doi:10.1002/cepa.701
fatcat:vddbenkrt5dbpbm6fhm2yzedg4
Unambiguous computations and locally definable acceptance types
1998
Theoretical Computer Science
Hertrampf's locally definable acceptance types show that many complexity classes can be defined in terms of polynomial-time bounded NTMs with simple local conditions on the nodes of its computation tree ...
We introduce a modification of Hertrampf's locally definable acceptance types which allows to get a larger number of characterizable complexity classes. ...
Acknowledgements We are grateful to Uli Hertrampf for several fruitful remarks on the conference version of this paper and to the anonymous referees for numerous insightful comments. ...
doi:10.1016/s0304-3975(97)00005-4
fatcat:c5mxwueohzerrhynsaihw5mmky
Actionable Analysis: Toward a Jurisdictional Evaluation of Primary Care Access in the Community Context
2019
Journal of Primary Care & Community Health
We examined multiple measures of adult primary care access, health status, and socioeconomic position at the New York City Council District level—a unit of analysis both relevant to and actionable by local ...
Furthermore, higher rates of primary care providers in high-poverty districts accepted Medicaid and had Patient-Centered Medical Home recognition, increasing constituent accessibility. ...
, and the bidirectional acceptability of patients and providers. 18, 19 Much of the existing research on primary care access includes only a single measure of access, likely due to difficulties integrating ...
doi:10.1177/2150132719891970
pmid:31872794
pmcid:PMC6931139
fatcat:gciwbckbg5e47lpdsrthzv2iki
Attribute-Based Mining Process for the Organization-Based Access Control Model
2013
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
We propose to bridge the gap between the theory of access control models and the reality of organizations by defining an attribute-based mining process that deduce the abstract concepts starting from the ...
attribute level. ...
In OrBAC, a policy is defined at the abstract level (also known as the organizational level) and then expressed at the concrete level by a derivation process. ...
doi:10.1109/trustcom.2013.53
dblp:conf/trustcom/WazanBDG13
fatcat:ufefm5rkujebho3gckq2gacgji
An Integrated Conceptual Model of Visually Impaired Users' Experience and Technology Acceptance of a Website
2019
International Journal of Advanced Trends in Computer Science and Engineering
However, the aim of this paper is to present an integrated conceptual model focusing on understanding visually impaired users' experience and technology acceptance of a website. ...
This model will be used in further empirical study on modelling the relationship of visually impaired users' experience and technology acceptance on web application. ...
It was understood that the definition of web accessibility is difficult to quantify, define, or agree upon [26] . ...
doi:10.30534/ijatcse/2019/4981.42019
fatcat:oporgvivjjf3dis5fk275n4lqi
Page 149 of AIDS Care Vol. 17, Issue 2
[page]
2005
AIDS Care
The association of HIV knowledge and the acceptance of the test was less clearly defined. ...
One major finding in our study was the significant association between the acceptance of the test and the Chinese subjects’ level of education, level of HIV knowledge and level of utilization of various ...
A Flexible Access Control Model for Web Services
[chapter]
2004
Lecture Notes in Computer Science
Without custom integration
Without custom integration
Web Services
Web Services
HTTPS is protocol-level security
HTTPS is protocol-level security
Point-to-point: lasts only for the duration of ...
their access requests in order to obtain authorizations order to obtain authorizations An access control policy is defined by three An access control policy is defined by three elements: elements: A service ...
apply to group Granularity levels of policies: policies that apply to group of services of services Authorization derivation rules, allowing authorizations Authorization derivation rules, allowing authorizations ...
doi:10.1007/978-3-540-25957-2_2
fatcat:f2n7dd5jrvdp5dp4ythpgyjehy
Informatics Security Metrics Comparative Analysis
2007
Informatică economică
The informatics security concept is defined. ...
Metrics are built for the security of open informatics applications and a method for their validation is proposed. ...
Applications are grouped regarding risk levels, the levels depend on the relaxation of policies defined by the owner of the application. ...
doaj:f8c62631f94f431a9eaa2aeaef371b80
fatcat:pk4u7kxaknabdozkudbgb53wny
Defining Acceptable Levels for Ecological Indicators: An Approach for Considering Social Values
2007
Environmental Management
we believe the normative approach has considerable merit for defining acceptable levels of valued ecological system components. ...
Acknowledgments Many people helped with this project, including staff at the Lake Champlain Basin Program and all of the partner federal, state, and provincial agencies. ...
Unfortunately, the failure to define acceptable levels is a common shortcoming of many indicator initiatives. ...
doi:10.1007/s00267-005-0282-3
pmid:17203340
fatcat:5c6mt4dok5gpdgnlz6mnteliye
Evaluation of Access to Care for Patients with Chronic Kidney Disease Not on Dialysis in Saint-Louis Region (SENEGAL)
2020
Open Journal of Nephrology
Bivariate analysis showed that acceptability and effectiveness of care were linked to CKD stage while the quality of patients' information was correlated with their educational level. ...
Identification of the main barriers will help define appropriate strategies to achieve universal access to quality renal care. ...
Conflicts of Interest The authors declare no conflicts of interest regarding the publication of this paper. ...
doi:10.4236/ojneph.2020.101001
fatcat:eec2yrlgr5ey3hhdixxaxuckjq
Agile Network Access Control in the Container Age
2018
IEEE Transactions on Network and Service Management
High-level application-specific security requirements are not appropriately enforced by low-level network access control lists. ...
However, the fundamental security primitive of network access control for a distributed microservice deployment is often ignored or left to the network operations team. ...
This work was supported by the German Federal Ministry of Education and Research ...
doi:10.1109/tnsm.2018.2889009
fatcat:zwrjmvyvi5hv5fa5impjeq4try
The Majority of High-Impact Science Journals Would Accept Manuscripts Derived from Open Access Electronic Theses and Dissertations
2015
Evidence Based Library and Information Practice
The rest of the respondents had some acceptance restrictions, including case-by-case review (19.4%), accept only if the content differs significantly from the original (8.3%), accept or only if access ...
Only 12.5% of the journals surveyed indicated they would "never accept" manuscripts derived from open access ETDs, while 51.4% indicated revised EDTs are "always welcome." ...
This study generated solid evidence to demonstrate the level of publisher acceptance towards manuscripts derived from open access ETDs. ...
doi:10.18438/b8vk58
fatcat:uwkvqovcpvfefnvpylrxpbmhse
Utility-Based Policy Management System for Virtual Organization
2009
Journal of Computer Science
It outperforms the related system by 9.99% for acceptance function and 5.77% for conflict resolution and 4.65% for policy merging. ...
Each of the VO classes has different goals that hope to be achieved by providing policies. ...
(level of acceptability) from participants' viewpoints. ...
doi:10.3844/jcssp.2009.635.645
fatcat:wvcn3wc4xbaitdgfywckaln5um
« Previous
Showing results 1 — 15 out of 1,870,682 results