Third-party transfers in WLCG using HTTP
نویسندگان
چکیده
منابع مشابه
Transfers and Altruistic Punishments in Third Party Punishment Game Experiments
Our research is a variant of the third party punishment game. In particular, we want to test whether players have heterogeneous preferences; the levels of the sanction and of the transfer are proportional to the unfairness of the Dictator; the change of the role influences the Observer’s reaction to unfair behavior; players’ decision to punish the Dictator and/or to help the Receiver depends on...
متن کاملself-revision and third party revision in translation
اهمیت این پژوهش در آن بود که به گفت? بسیاری از پژوهشگرانِ حوز? بازبینی ترجمه، ادبیات موجود در این زمینه به لحاظ نظری و عملی چندان قوی نیست و بخش های موجود نیز برداشت مناسبی از این مرحل? فرایند ترجمه ندارند، اگرچه اخیراً توجه به آن به صورت نظام مند افزایش یافته است. در عین حال، پژوهش های موجود از یک سو بر دگربازبینی بیشتر از خودبازبینی تأکید دارند و از دیگر سو تنها به لحاظ نظری به این موضوع می پرد...
15 صفحه اولParty Pooper: Third-Party Libraries in Android
Third-party libraries (3PLs), such as advertising networks, gaming networks, and analytics engines, are an integral part of modern mobile platforms. If Android developers want to integrate functionality provided by 3PLs, they must bundle opaque binary code into their applications. Unfortunately, developers must in essence overprivilege their Android applications by requesting dangerous permissi...
متن کاملExposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites
This article provides a quantitative analysis of privacy compromising mechanisms on one million popular websites. Findings indicate that nearly nine in ten websites leak user data to parties of which the user is likely unaware of; over six in ten websites spawn third-party cookies; and over eight in ten websites load Javascript code from external parties onto users’ computers. Sites which leak ...
متن کاملExposing the Hidden Web: An Analysis of Third-Party HTTP Requests on One Million Websites
This article provides a quantitative analysis of privacy compromising mechanisms on one million popular websites. Findings indicate that nearly nine in ten websites leak user data to parties of which the user is likely unaware of; over six in ten websites spawn third-party cookies; and over eight in ten websites load Javascript code from external parties onto users’ computers. Sites which leak ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EPJ Web of Conferences
سال: 2020
ISSN: 2100-014X
DOI: 10.1051/epjconf/202024504031