نتایج جستجو برای: trade secrets and ets
تعداد نتایج: 16840162 فیلتر نتایج به سال:
At least on the surface, most cyber attacks appear to be clearly unethical as well as illegal. These include attacks performed for amusement or bragging rights, such as web defacements conducted “just for fun” and computer viruses launched out of curiosity but disregard for their consequences. They also include attacks done for personal gain, such as system intrusions to steal credit card numbe...
In this paper we report some experiments designed to clarify some issues and to test some of the assumptions in the model of reasoning with legal cases advanced by Bench-Capon and Sartor. We identify the questions to be explored, briefly describe a tool developed to support these experiments and report the results of a series of experiments based on Aleven’s analysis of US Trade Secrets cases. ...
The goal of program obfuscation is to provably complicate the task of reverse engineering. Owners of source code wish to make it as hard as possible for others to extract information from their binaries information which may reveal trade secrets, allow undesirable modifications, or enable software piracy. Obfuscation is typically seen as a problem relating to programming languages or compilers....
In contrast to the explosion of consumer wearable health device market, which includes millions of units sold worldwide, the efforts undertaken to validate the accuracy and reliability of these monitoring apps and devices have been minimal [1]. To reach this understanding there are several barriers. In the domain of sleep tracking, sleep researchers have yet to define standard metrics for valid...
objective: to validate the triage ratings performed by the electronic triage system (ets) using hospitalization, length of stay, resource use, in-hospital mortality and patient bills as outcome measures. methods: in this retrospective cross-sectional study the medical records of 387 patients were reviewed in a one-week period. the data included triage category and the outcome measures were hosp...
Introduction: Environmental tobacco smoke (ETS) exposure is a threat for health worldwide. The aim of this study was to determine the environmental tobacco smoke (ETS) exposure in people over 15 years old in Bandar Abbas, Iran. Methods: In this cross-sectional study a total of 387 subjects were selected by cluster sampling method. Data were collected by a questionnaire including demograph...
In the guessing secrets problem defined by Chung, Graham and Leighton [9], player B has to unveil a set of k > 1 secrets that player A has chosen from a pool of N secrets. To discover the secrets, player B is allowed to ask a series of boolean questions. For each question asked, A can adversarially choose one of the secrets but once he has made his choice he must answer truthfully. In this pape...
objectives the present study aimed to compare the efficacy rate of avfs using two different anastomosis methods; side to side (sts) versus end to side (ets) and to determine whether the different approaches render any preferences or complications. background in candidate patients for permanent hemodialysis or dialysis on a regular basis, an appropriate vascular access has great importance. the ...
Arguably, the climate talks in Copenhagen in December 2010 did not deliver on the high expectations the world had raised for a post-Kyoto agreement. But the commitment to confront climate change at the highest level is beyond doubt. At the time of writing, the EU Commission is to propose a draft regulation on large scale auctioning in the European Union Emissions Trading Scheme (EU ETS) startin...
In the actual process of web crawler infringement and criminal identification, there is a theory “weakening typology strengthening presumption legal interest”. This also basic method for subsequent identification in commercial application enterprise data through technology. article summarizes risks abusing technology based on previous work experience. The author discusses judicial interpretatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید