نتایج جستجو برای: users violations
تعداد نتایج: 222582 فیلتر نتایج به سال:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users’ carefree attitude in sharing information, the often sub-par security measures from the part...
A formal framework for software development and analysis is presented, which aims at reducing the gap between formal specification and implementation by integrating the two and allowing them together to form a system. It is called monitoring-oriented programming (MOP), since runtime monitoring is supported and encouraged as a fundamental principle. Monitors are automatically synthesized from fo...
The new possibility of accessing an infinite pool of computational resources at a drastically reduced price has made cloud computing popular. With the increase in its adoption and unpredictability of workload, cloud providers are faced with the problem of meeting their service level agreement (SLA) claims as demonstrated by large vendors such as Amazon and Google. Therefore, users of cloud reso...
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users’ carefree attitude in sharing information, the often sub-par security measures from the part...
With the popularity of smart portable devices and advances in wireless technologies, mobile marketing increases quickly. Among various methods, short message is regarded as the most efficient mode. While mobile advertising enhances communication with consumers, the messages without a required permission cause privacy violations. So, how to simultaneously supporting personalization and privacy p...
Traffic accidents often cause motorists and road users to suffer minor injuries or death. Based on the law, traffic violation cases should be resolved through legal channels. In reality, there is peace against violations at police level. This study intended determine of allowing highway crimes, find out made by perpetrators related victims crimes. The research method used normative methods empi...
Abstract Recent information privacy research has started to spark a debate about infringements that happen not on an individual, but multi-party level. Here, person’s own is affected by the decisions of others – phenomenon referred as interdependent privacy. Building 3R Interdependent Privacy Protection Framework, we explore underlying mechanisms how and why violations they can be remedied. Dra...
Repairing violations of integrity constraints in databases can be seen as an interleaving diagnostic/repair process. In this paper we introduce a new approach on repairing constraint violations by adopting existing techniques from model{based diagnosis. Violations of integrity constraints observed in an inconsistent database state are diagnosed and repair actions are deduced from diagnoses. By ...
Repairing violations of integrity constraints in databases can be seen as an in-terleaving diagnostic/repair process. In this paper we introduce a new approach on repairing constraint violations by adopting existing techniques from model{based diagnosis. Violations of integrity constraints observed in an inconsistent database state are diagnosed and repair actions are deduced from diagnoses. By...
The present experiment tested the hypothesis that discrepancies in processing fluency influence the perceived wrongness of moral violations. Participants were presented with numerous moral violations in easy or difficult to read font. For some violations experienced perceptual fluency was consistent with the fluency associated with previous violations, whereas for others it was more fluent or m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید