نتایج جستجو برای: users violations
تعداد نتایج: 222582 فیلتر نتایج به سال:
Recent approaches to integrity enforcement in active databases suggest not only to check constraint violations by triggers but also to utilize triggers to perform inconsistency repair actions. However, for sophisticated reactions these approaches often require refinements of already derived integrity maintaining and inconsistency repairing triggers. We argue that analyzing and specifying reacti...
We present initial results on a comprehensive model of structured communications, in which selfadaptation and security concerns are jointly addressed. More specifically, we propose a model of self-adaptive, multiparty communications with secure information flow guarantees. In this model, security violations occur when processes attempt to read or write messages of inappropriate security levels ...
Background and Objectives: Human errors are the most important factors for RTIs, which have been addressed in few quantitative studies. The objective of this study was to calculate the annual population attributable fraction (PAF) of the most important human risk factor for RTIs in the streets and highways of the Great Tehran. Methods: In this study, the data of 124518 individuals registere...
BACKGROUND This article examines the ethical implications of using respondent-driven sampling (RDS) to conduct HIV behaviour surveillance among injection drug users (IDUs) in Chicago. Ethnographic inquiry illustrates how the design and implementation of RDS invites if not promotes manifold violations of federal guidelines governing human research subject protections. METHODS Post hoc structur...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید