... Colombia, and specifically on the conception and application of the academic credit, and its relation with the independent work of the student and the incorporation of technologies of the ...
... Con las necesidades operativas del campo profesional para hacer del proyecto un diseño eficiente, dinámico y con mayores recursos para manejar la perspectiva, medios como el uso de tres dimensiones (3D) y su ...
... start and stop ...time, and included events of a Service Episode is entirely arbitrary; it may include a single outpatient visit or a hospitalization, or extend over significant period of time, ...
... of InformationandCommunications Technology Japanese Learner English (NICT JLE) Corpus were extracted and the appropriateness of these linguistic features was rated by twenty English language ...
... develop and apply a methodological tool that allows redefining the key elements of its operation continuously, in line with the most updated international models, I order to contribute to the proper management of ...
... literature and the main differences are in the concept of Informationandcommunications technologies they ...technologies and those who do not; or the gap between those who use digital ...
... Desarrollar la tecnología y los procedimientos para la elaboración de los videos didácticos digitales y software educativo que responda a las particularidades del modelo pedagógi[r] ...
... developments and knowledge, for administrations and citizens. InformationandCommunications Technology are called on to be one of the key players to get these cities to use smart ...
... Purpose - The purpose of this paper is to analyse the needs of people with Alzheimer's disease and their caregivers in terms of information and communications technology (ICT) and home [r] ...
... the information able to penetrate through the media ...globalization and rapid commercial and technological expan- sion, or suggesting alternatives, is por- trayed as reactionary or ...fact, ...
... in Information Security and its Application; Communications in Computer andInformation Science; 3rd International Conference on Information Security and Assurance, ...
... attack and Sybil ...node and this receives the delayed ...share information about the ...wrong informationand then repeats it, network behavior could be affected ...the ...
... Serradell-Lopez, E.; Alguero, CG. (2010). Subcultures in Large Companies: An Exploratory Analysis. 3rd World Summit on the Knowledge Society, SEP 22-24, 2010 Corfu Island, Greece. ORGANIZATIONAL, BUSINESS, AND ...
... of communications, the costs of management, monitoring, and compliance also increase ...of communications, there are five ways for someone to break in and steal the company’s most critical ...
... governance, and last but not least in a ...marketplace and social communications agora, full of shopping malls, commercial content, chat forums, learning plat- forms, subject oriented empowerment ...
... A year later, in 1949 , Shannon’s "Communication theory of secrecy systems" [ 108 ] came to light. In words of Robert Gallager "Shannon’s cryptography work can be viewed as changing cryptography from an art ...
... COP9 and COP10) held, respectively, in San José, Costa Rica, in May 1999, Valencia, Spain, in November 2002, Kampala, Uganda, in November 2005, and Changwon, Republic of Korea, October-November ...those ...
... investigate and analyze authentic problems (Area, ...to information (as searching, processing or dissemination), collaboration, communication , critical thinking and organization amongst ...
... engagement and accomplishment; they bring skills, values and knowledge that would profit both students and ...assurance and motivation. Research and practice have both established that ...