نتایج جستجو برای: users violations

تعداد نتایج: 222582  

Journal: :JITR 2014
Enrico Franchi Agostino Poggi Michele Tomaiuolo

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users’ carefree attitude in sharing information, the often sub-par security measures from the part...

2004
Feng Chen Marcelo d'Amorim Grigore Rosu

A formal framework for software development and analysis is presented, which aims at reducing the gap between formal specification and implementation by integrating the two and allowing them together to form a system. It is called monitoring-oriented programming (MOP), since runtime monitoring is supported and encouraged as a fundamental principle. Monitors are automatically synthesized from fo...

2012
Funmilade Faniyi Rami Bahsoon Georgios Theodoropoulos

The new possibility of accessing an infinite pool of computational resources at a drastically reduced price has made cloud computing popular. With the increase in its adoption and unpredictability of workload, cloud providers are faced with the problem of meeting their service level agreement (SLA) claims as demonstrated by large vendors such as Amazon and Google. Therefore, users of cloud reso...

Journal: :JITR 2015
Enrico Franchi Agostino Poggi Michele Tomaiuolo

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users’ carefree attitude in sharing information, the often sub-par security measures from the part...

2010
Yuqing Sun Guangjun Ji

With the popularity of smart portable devices and advances in wireless technologies, mobile marketing increases quickly. Among various methods, short message is regarded as the most efficient mode. While mobile advertising enhances communication with consumers, the messages without a required permission cause privacy violations. So, how to simultaneously supporting personalization and privacy p...

Journal: :International Journal of Social Science 2022

Traffic accidents often cause motorists and road users to suffer minor injuries or death. Based on the law, traffic violation cases should be resolved through legal channels. In reality, there is peace against violations at police level. This study intended determine of allowing highway crimes, find out made by perpetrators related victims crimes. The research method used normative methods empi...

Journal: :Electronic Markets 2022

Abstract Recent information privacy research has started to spark a debate about infringements that happen not on an individual, but multi-party level. Here, person’s own is affected by the decisions of others – phenomenon referred as interdependent privacy. Building 3R Interdependent Privacy Protection Framework, we explore underlying mechanisms how and why violations they can be remedied. Dra...

1995
Michael Gertz Udo W. Lipeck

Repairing violations of integrity constraints in databases can be seen as an interleaving diagnostic/repair process. In this paper we introduce a new approach on repairing constraint violations by adopting existing techniques from model{based diagnosis. Violations of integrity constraints observed in an inconsistent database state are diagnosed and repair actions are deduced from diagnoses. By ...

1995
Michael Gertz Udo W. Lipeck

Repairing violations of integrity constraints in databases can be seen as an in-terleaving diagnostic/repair process. In this paper we introduce a new approach on repairing constraint violations by adopting existing techniques from model{based diagnosis. Violations of integrity constraints observed in an inconsistent database state are diagnosed and repair actions are deduced from diagnoses. By...

Journal: :Cognition 2009
Simon M Laham Adam L Alter Geoffrey P Goodwin

The present experiment tested the hypothesis that discrepancies in processing fluency influence the perceived wrongness of moral violations. Participants were presented with numerous moral violations in easy or difficult to read font. For some violations experienced perceptual fluency was consistent with the fluency associated with previous violations, whereas for others it was more fluent or m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید