The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the unfolding model of voluntary employee turnover, this paper has investigated the influence of coworker turnover (CT) on stayer turnover intention (TI), the mediating effect of job satisfaction (JS) and the moderating effect of Self-perceived Employability (SPE) for stayer. Data has been collected from 259 employees came from 21 regions. By using hierarchical regression and bootstrapping,...
One of the main advantages of HPC clusters is the flexibility and efficiency they bring to their user. With the increasing number of applications being served by HPC systems, new systems need to serve multiple users and multiple applications. Traditional HPC systems typically served a single application at a given time, but to maintain maximum flexibility a new concept of ldquoHPC as a servicerdquo...
Spam wastes Internet processing, bandwidth, and storage. Like many other sociotechnical problems computing today faces, it's not solvable by purely technical approaches like filters or social responses like passing laws. Channel e-mail offers a solution that can enable social as well as technical communication efficiency.
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.