نتایج جستجو برای: owner
تعداد نتایج: 8917 فیلتر نتایج به سال:
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. Co...
Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes which solve most of the security weaknesses detected in previously published protocols. However, this paper reviews this work and points out that such schemes still present some practical and secu...
Citation: Kovács K, Virányi Z, Kis A, Turcsán B, Hudecz Á, Marmota MT, Koller D, Rónai Z, Gácsi M and Topál J (2018) Dog-Owner Attachment Is Associated With Oxytocin Receptor Gene Polymorphisms in Both Parties. A Comparative Study on Austrian and Hungarian Border Collies. Front. Psychol. 9:435. doi: 10.3389/fpsyg.2018.00435 Dog-Owner Attachment Is Associated With Oxytocin Receptor Gene Polymorp...
Received (received date) Revised (revised date) Communicated by (Editor Name) ABSTRACT We investigate parallel algorithms to compute recursively deened functions. Our computational model are parallel random access machines (PRAM's). We preferably make use of the OROW-PRAM (owner read, owner write), a model supposed to be even weaker and more realistic than the EREW-PRAM (exclusive read, exclusi...
Received (received date) Revised (revised date) Communicated by (Editor Name) ABSTRACT We investigate parallel algorithms to compute recursively deened functions. Our computational model are parallel random access machines (PRAM's). We preferably make use of the OROW-PRAM (owner read, owner write), a model supposed to be even weaker and more realistic than the EREW-PRAM (exclusive read, exclusi...
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described...
With the limited computing power cloud permit users to outsource their data. However, a security issue has been always obstacle to the use of computing outsourcing. Recently, there is huge growth in the use of number of security passwords for web based application and encryption keys required to securely outsource the data. User encrypts the data using encryption before uploading it on cloud an...
Cash flow, Markov chains, contractor payment, owner classification
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید