نتایج جستجو برای: dynamic permission activation
تعداد نتایج: 849979 فیلتر نتایج به سال:
This open-access article is published and distributed under the Creative Commons Attribution NonCommercial No Derivatives License (http://creativecommons.org/licenses/by-nc-nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article witho...
This open-access article is published and distributed under the Creative Commons Attribution NonCommercial No Derivatives License (http://creativecommons.org/licenses/by-nc-nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article witho...
This open-access article is published and distributed under the Creative Commons Attribution NonCommercial No Derivatives License (http://creativecommons.org/licenses/by-nc-nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article witho...
This open-access article is published and distributed under the Creative Commons Attribution NonCommercial No Derivatives License (http://creativecommons.org/licenses/by-nc-nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article witho...
Android has become the most popular operating system for mobile devices, which makes it a prominent target for malicious software. The security concept of Android is based on app isolation and access control for critical system resources. However, users can only review and accept permission requests at install time, or else they cannot install an app at all. Android neither supports permission ...
The Android platform has about 130 application level permissions that govern access to resources. The determination of which permissions to request is left solely to the application developer. Users are prompted to approve all application permissions at install time, and permissions are silently enforced at execution time. Although many applications make use of a wide range of permissions, we h...
This paper presents Wechsler (WISC-R) profiles and changes following the application of an EEG biofeedback treatment regimen for brain-based learning disabilities. EEG biofeedback trained increases in activation (increased amplitude of 14Hz brainwave energy) of the central and sensorimotor cortex's neural activation network resulted in increases in bi-hemispheric skills (complementary verbal-ex...
In this paper I discuss how to account for the performative effects of imperatives, and concentrate mainly on permission sentences. In the first part of the paper I argue that the performative effects of permission sentences should be accounted for in terms of a context change theory by making use of contraction defined in terms of an ordering relation, and show also how this ordering relation ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید