نتایج جستجو برای: dynamic permission activation

تعداد نتایج: 849979  

2014
Matthew C. Little Rebecca J. M. Hurst Kathryn J. Else

Macrophages (Mws) accumulate at sites of inflammation, and, because they can assume several functionally distinct states of activation, they can either drive or restrain inflammatory responses. Once believed to depend on the recruitment of blood monocytes, it is now clear that the accumulation of Mws in some tissues can result from the proliferation of resident Mws in situ. However, little is k...

1998
Noah J. Cowan Daniel E. Koditschek

We describe work-in-progress toward a nonlinear image-based rigid body dynamic triangulator which we believe tracks a moving target from "essentially all" initial conditions (all initial conditions except a set of measure zero). The dynamic triangulator depends on the goal state only through its image plane position and velocity and requires a navigation function, imposed directly upon image fe...

2002
Nikhilesh Dholakia Morten Rask

M-commerce refers to monetary transactions conducted via a mobile telecommunications network using a communication, information, and payment (CIP) device such as a mobile phone or a palmtop unit. Success in mobile portal markets will depend on dynamic strategies that blend elements of personalization, permission, and specification of content. This paper presents of framework for developing effe...

2017
Thomas J. Kremen Maxim Bez Joseph C. Giaconi Wafa Tawackoli Pablo Avalos Dmitriy Sheyn Jess G. Snedeker Zulma Gazit Gadi Pelled Dan Gazit

This open‐access article is published and distributed under the Creative Commons Attribution ‐ NonCommercial ‐ No Derivatives License (http://creativecommons.org/licenses/by‐nc‐nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article w...

Journal: :Pattern Recognition Letters 2002
Georgy L. Gimel'farb

Conventional binocular dynamic programming stereo is based on matching images of a given stereopair in order to obtain Bayesian or maximum likelihood estimates of hidden Markov models of epipolar terrain profiles. Because of partial occlusions and homogeneous textures, this problem is ill-posed and has to be regularised for getting a unique solution. Regularised matching involves usually heuris...

Journal: :Sustainability 2021

Recently, damages such as internal system intrusion, network and device vulnerability attacks, malicious code infection, information leakage due to security attacks are increasing within the smart grid environment. Detailed dynamic access control must be implemented enable power in environment respond attacks. Dynamic partial delegation available, permission role restrictions considered for whe...

2014
Sercan Önal Filiz Can Yavuz Yakut Gül Baltacı

This open-access article is published and distributed under the Creative Commons Attribution NonCommercial No Derivatives License (http://creativecommons.org/licenses/by-nc-nd/3.0/), which permits the noncommercial use, distribution, and reproduction of the article in any medium, provided the original author and source are credited. You may not alter, transform, or build upon this article witho...

2001
Georgy Gimel'farb Tao Wu

The paper considers probabilistic regularisation of partial occlusions in the intensity-based symmetric dynamic programming stereo (SDPS). The regularised SDPS relates the total similarity of corresponding pixels to a cumulative log-likelihood ratio for a profile that yields the correspondences. Transition probability models are investigated in detail in order to explicitly relate the likelihoo...

ارژنگ, اردوان, حمیدی, محمدرضا,

From the viewpoint of some experts in Sharia law, paying bribes in lawsuits by the beneficiary is lawful. Some others believe that this permission is only possible when obtaining the right is restricted to paying the bribe. Various reasons, including Islamic traditions Hadiths[, the rule of denial of hardship, and the permission to obtain the right are the evidences for this verdict. Studies sh...

2015
Yuan Zhang Min Yang Guofei Gu Hao Chen

To protect sensitive resources from unauthorized use, modern mobile systems, such as Android and iOS, design a permission-based access control model. However, current model could not enforce fine-grained control over the dynamic permission use contexts, causing two severe security problems. First, any code package in an application could use the granted permissions, inducing attackers to embed ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید