نتایج جستجو برای: dynamic permission activation
تعداد نتایج: 849979 فیلتر نتایج به سال:
When it comes to permission imperatives, a basic question that must be answered is whether they should receive the same basic analysis as strong imperatives (i.e., those which express commands and the like). If the answer is positive, the difference should lie in some aspect of the context. Portner (2004, 2008), Schwager (2005b), and maybe Mastop (2005) take this view. If it is negative, a perm...
We have developed a genre of software construction kits and a framework for implementing them. The framework is both conceptual and structural. Its conceptual aspect derives from constructivist learning theory, and its structural aspect extends the Java Abstract Windowing Toolkit. This framework, called the “Kit4Kits,” supports generation of software kits that are highly graphical and highly in...
Purpose: A proper warm-up method can be used as a strategy to improve performance of athletes in various sport fields. The aim of present study was to compare the effect of two traditional and post-activation potentiation warm-up methods on electromyographic variables of lower extremity muscles during squat jump. Methods: Fourteen trained male athletes were randomly performed three different p...
In his book Man La-Yadhiraho al-Faqih, Sheikh al-Saduq reports a group of traditions whose common theme is the permission and lawfulness of work. By accepting this group of traditions he founds a rule on whose base he issues his personal judgment. This rule which is called “permission” (rukhsat) in the literature of Sheikh al-Saduq is one of the methods which he uses in solving the ...
Raw 3D data were streamed from standard echocardiograph using custom connection to DICOM viewer workstation (CarnaLife Holo, MedApp, Krakow, Poland) for real-time, dynamic rendering and wirelessly transferred into HoloLens mixed reality display (Microsoft, Redmond, USA) overlay non-obstructive hologram upon view. Data visible as a semitransparent holographic cube positioned in convenient sector...
Fractional permissions have recently received much attention for sound static reasoning about programs that rely on aliasing, but they are challenging to track automatically. This paper contributes an algorithm for proving permissionbased assertions in a decidable fragment of linear logic. Unlike previous work, our inference approach supports polymorphism over fractions. The paper also describe...
The recent evolution on the smart phone technology has made its application market huge and less secure. Every single day large number of apps introduced in the android market (mostly on google play store) without any particular inspections which creates a lot of security issues and they remain unresolved. There are a lot of recent and increasing security issues which are mostly caused by the a...
We present a reduction from a new logic extending van der Meyden’s dynamic logic of permission (DLP) into propositional dynamic logic (PDL), providing a 2EXPTIME decision procedure and showing that all the machinery for PDL can be reused for reasoning about dynamic policies. As a sideeffect, we establish that DLP is EXPTIME-complete. The logic we introduce extends the logic DLP so that the poli...
most specialists in the field of foreign language teachingconsiderreading skill as an interactive process between the reader’s prior knowledge and the text.accordingly, the activation of prior knowledge for an effective comprehension is very important. it is generally agreed that the pre-reading phase is the stage where this type of interaction and activation may be enhanced throughcertain stra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید