نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Journal: :American Journal of Ophthalmology 1922

2017
Emre Uzun Gennaro Parlato Vijayalakshmi Atluri Anna Lisa Ferrara Jaideep Vaidya Shamik Sural David Lorenzi

Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...

خسروی شادمانی, فاطمه, زایری, فرید, سوری, حمید, مهماندار, محمد رضا, کرمی, منوچهر,

Background & Objectives: In the chain of vehicles, human and environment, the human factors are the most complex element in the causes of road traffic injuries (RTIs). Unauthorized speeding and overtaking are considered as the main human factors resulting RTIs. This study estimated the population attributablefraction of two human factors, the most common risk factors of rural roads, of RTIs. Me...

Journal: :Astronomy & Geophysics 1997

Journal: :Journal of the American Medical Association 1909

Journal: :مطالعات حقوق خصوصی 0
سام محمدی دانشیار گروه حقوق خصوصی دانشکدۀ حقوق و علوم سیاسی دانشگاه مازندران محمد فرزانگان دانشجوی دکتری حقوق خصوصی دانشکدۀ حقوق و علوم سیاسی دانشگاه مازندران

according to civil law and shia fiqh, unauthorization is a phenomenon involved in various contracts including marriage. studies on unauthorized transactions tried to reveal the conditions of authorization, principal and authorized marriage so that principal plays no role here or is influenced. fiqh and law textbooks indicate that role of principal's intention fades gradually and are largel...

Journal: :Acta ad archaeologiam et artium historiam pertinentia 1970

Journal: :Journal of Glaciology 1971

Journal: :Journal of the American Medical Association 1914

2010
Samuel Shu Kin Kwan Kar Yan Tam

Software piracy has been studied by academics, software firms, law enforcement agents and policy makers for many years. Previous research in software piracy either did not differentiate between unauthorized copying and unauthorized sharing, or focused only on unauthorized copying. We believe the motivating factors behind the two behaviors are quite different because beneficiaries of the behavio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید