نتایج جستجو برای: users violations

تعداد نتایج: 222582  

2018
Shachar Lovett

The GM-MDS conjecture of Dau et al. (ISIT 2014) speculates that the MDS condition, which guarantees the existence of MDS matrices with a prescribed set of zeros over large fields, is in fact sufficient for existence of such matrices over small fields. We prove this conjecture.

Journal: :Proceedings on Privacy Enhancing Technologies 2022

Abstract The sending of marketing emails is regulated to protect users from unsolicited emails. For instance, the European Union’s ePrivacy Directive states that marketers must obtain users’ prior consent, and General Data Protection Regulation (GDPR) specifies further such consent be freely given, specific, informed, unambiguous. Based on these requirements, we design a labeling legal characte...

Journal: :Psychological medicine 2009
L Degenhardt W T Chiu K Conway L Dierker M Glantz A Kalaydjian K Merikangas N Sampson J Swendsen R C Kessler

BACKGROUND The 'gateway' pattern of drug initiation describes a normative sequence, beginning with alcohol and tobacco use, followed by cannabis, then other illicit drugs. Previous work has suggested that 'violations' of this sequence may be predictors of later problems but other determinants were not considered. We have examined the role of pre-existing mental disorders and sociodemographics i...

ژورنال: مجله طب نظامی 2019

Background and Aim: Personality may be studied to predict human behavior in military organizations. The aim of this study is to survey the relationship between personality characteristic of military commanders and violations of soldiers under command. Methods: This descriptive - survey study was carried out in middle and senior military commanders in military units of a Tehran military Headquar...

آبرودی, مجتبی, حسینی, تیمور, کشفی, سعید,

Driving without observance of driving laws and regulations threatens the order and safety of any society and disrupts the comfort of the people of that society. According to the new law on defamation and 289 percent increase in violations in 2016 compared to 2010, the purpose of this study is to investigate the deterrent effect of the new law on the investigation of violations of accidents and ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

if the precise implementation of the principle of proportion and:balance between the violation and the penalty as well as the other dimensions could be considered as a stick yard for the imptementation of justice any lack of preciseness in carrying out such principle would not indeed be much too far from injustice . naturally ,if it would be imagined that the objective of balance between...

2001
Lucila Ishitani Gustavo Machado Campagnani Gama Virgílio A. F. Almeida Dorgival Olavo Guedes Neto Wagner Meira

Concerns about users' privacy are currently attracting signi cant attention. Users usually do not approve of someone mining their actions and habits while they use the Web. On the other hand, having some information about the user's behavior is essential for providing personalized services. Thus, there is a clear demand for mechanisms that allow users to control their privacy without relying on...

2017
Narasimha Rao D. Sudha Cong Wang Kui Ren Wenjing Lou Jin Li Mehdi Sookhak Hamid Talebian Ejaz Ahmed Abdullah Gani Muhammad Khurram Qian Wang Marian K. Iskander Tucker Trainor Dave W. Wilkinson Adam J. Lee Panos K. Chrysanthis Qin Liu Guojun Wang Jie Wu

To ensure that the services are always-on and globally distributed, cloud service providers sacrifice consistency for availability. Most Cloud Service Provider’s provide only eventual consistency which is a form of weak consistency. Strong Consistency is required for certain applications which are interactive. In such cases an SLA is to be engaged between the Cloud Service Provider and the user...

2004
Bhavani Thuraisingham William Ford

The Inference Problem compromises database systems which are usually considered to be secure. Here, users pose sets of queries and infer unauthorized information from the responses that they obtain. An Inference Controller is a device that prevents and/or detects security violations via inference. This paper describes the issues involved in designing and implementing an intelligent database inf...

2007
Leszek Lilien Bharat Bhargava

The need for privacy is broadly recognized by individuals, businesses, the government, the computer industry, and academic researchers. Examples are shown in Figure 1. The growing recognition of the importance of privacy is motivated not only by users’ sensitivity about their personal data. Other factors include business losses due to privacy violations, and enactments of federal and state priv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید