نتایج جستجو برای: dynamic permission activation
تعداد نتایج: 849979 فیلتر نتایج به سال:
results all variables reached a peak at 1 minute post-jump. salivary alpha-amylase, galvanic skin responses and heart rate did not return to basal value at 90 minutes post-jump, while cortisol returned to basal value at 90 minutes post-jump. conclusions this evidence indicates that parachute jumping is accompanied by a dissociation of sns and hpa response patterns in novice parachutists, showin...
Mobile operating systems adopt permission systems to protect system integrity and user privacy. In this work, we propose INSPIRED, an intention-aware dynamic mediation system for mobile operating systems with privacy preserving capability. When a security or privacy sensitive behavior is triggered, INSPIRED automatically infers the underlying program intention by examining its runtime environme...
in recent years, the cloning technology has remarkably developed iran, but unfortunately, the required legal framework has not been created to support and protect such developments yet. this legal gap may lead to abuse of scientific researches to obtain illegal benefits and to undermine the intellectual property rights of scientists and researchers. thus to prevent such consequences, the attemp...
The Personal Identification Number or KTP is prone to be stolen and used by unwanted parties, this also a possibility for the Simpel Desa, village administration application that contain use Number. This study aims detect information security vulnerabilities. analyze vulnerabilities in applications using MobSF ISO 27002:2013. penetration testing malware applications. In Desa analyzed two ways, ...
This article presents the formalisation of the weak and strong permission in deontic logic based on the logic of enactment. A permission that follows from the absence of a prohibition, we call a weak permission; this permission is not enacted. A strong permission is always enacted (implicitly or explicitly), and implies a giving choice. The distinction between these two types of permission is a...
The impact of ideas and norms on world politics has received a good deal of attention in recent scholarship on international relations. Much of this effort was initially directed at engaging rationalist international relations theory on the causal and transformative impact of ideational forces vis-à-vis power and interest. But after gaining ground in this debate, idea scholars have now turned t...
In this paper we propose an extension of Defeasible Logic to represent different concepts of defeasible permission. Special attention is paid in particular to permissive norms that work as exceptions to opposite obligations.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید