نتایج جستجو برای: access restrictions to machines

تعداد نتایج: 10664006  

Journal: :journal of advances in computer research 2015
najibeh farzi veijouyeh jamshid bagherzadeh

filtering of web pages with inappropriate contents is one of the major issues in the field of intelligent network's security. having a good intelligent filtering method with high accuracy and speed is needed for any country in order to control users' access to the web. so, it has been considered by many researchers. presenting web pages in an understandable way by machines is one of the most im...

2006

Authentication permits principals to use a service, and, at the same time, prevents unauthorized users from masquerading as legitimate users to steal resources. For example, unknown users can be denied access to payroll information. Similarly, unknown services can be prevented from using virtual machines to complete tasks. Authenticated users, however, can use their virtual machines and access ...

Telemedicine has seen a recent surge in utilization with the current global Coronavirus pandemic. Prior to this increase in use, its application has been proven to be both safe and effective in primary care and surgical medicine. Its value has been demonstrated for utilization in both initial consultation and post-operative evaluation of orthopedic surgery patients, especially those with pathol...

Journal: :Digital Investigation 2015
Flávio Cruz Andreas Moser Michael I. Cohen

In the field of remote forensics, the GRR Response Rig has been used to access and store data from thousands of enterprise machines. Handling large numbers of machines requires efficient and scalable storage mechanisms that allow concurrent data operations and efficient data access, independent of the size of the stored data and the number of machines in the network. We studied the available GR...

توحیدخواه , فرزاد , رشیدی, سعید , فلاح , علی ,

One of the basic problems in signature verification is variability and differences apparent on patterns of signature even for an individual. Signature segmentation to basic components, in addition to the access to the stable features, the hidden differences are revealed between genuine and forgery patterns. In this paper, signature patterns of two-dimensional are segmented by using dominant poi...

Journal: :Archives of dermatology 2005
Eric J Hester Lauren F Heilig Renee D'Ambrosia Amanda L Drake Lisa M Schilling Robert P Dellavalle

OBJECTIVES To describe youth access to indoor UV tanning and youth discount pricing incentives in 4 states with different age restrictions: Colorado (no age restrictions), Texas (age 13 years), Illinois (age 14 years), and Wisconsin (age 16 years). DESIGN Cross-sectional telephone survey conducted in October 2003 using a standardized script to assess the practices of randomly selected UV tann...

2015
Keith Finlay Charles Stoecker Scott Cunningham Amanda Bruce

OBJECTIVES Restrictions on retail purchases of pseudoephedrine are one regulatory approach to reduce the social costs of methamphetamine production and use, but may impose costs on legitimate users of nasal decongestants. This is the first study to evaluate the costs of restricting access to medications on consumer welfare. Our objective was to measure the inconvenience cost consumers place on ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید