نتایج جستجو برای: users violations
تعداد نتایج: 222582 فیلتر نتایج به سال:
In online social networks (OSNs), users are allowed to create and share content about themselves and others. When multiple entities start distributing content, information can reach unintended individuals and inference can reveal more information about the user. Existing applications do not focus on detecting privacy violations before they occur in the system. This thesis proposes an agent-base...
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a dramatic increase in popularity of location-based services (LBS) tailored to users’ locations. The comfort of LBS comes with a privacy cost. Various distressing privacy violations caused by sharing sensitive location information with potentially malicious services have highlighted the importance of location...
1 Formal Logic with Conceptual Graphs 3 Frithjof Dau 1.
G(u,u',u") = 0, (1) where u = u(x, x,..., x), and u', u" denote all the first and second partial derivatives of u. For simplicity we will assume here that both u and G are scalars and denote by ua, uab, the partial derivatives dau and respectively dahu; a,b =1,2, ..., n+1. Let u (x) be a given solution of (1). Our equation is said to be elliptic or hyperbolic at u°(x) according to whether the (...
Traffic congestion and road violations have become persistent challenges in urban areas, necessitating the development of efficient systems to address these issues. This abstract presents an overview a mobile application called Dapper, designed make traffic management empower both police users. The Dapper aims provide comprehensive solution by enabling users, police, administrators effectively ...
Accurate estimation of saturation flow rate is a prerequisite for accurate estimation of level of service and delays of signalized intersections. Saturation flow rate of intersections depends on many factors, including traffic behavior and culture. One of the important problems of traffic behavior in Iran is the violation of law at the physical region of intersections. The main purpose of this ...
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of finding and preserving useful clues in large networks of operational machines. To augment a computer crime investigator’s efforts, the approach presented in this paper is an expert system with a decision tree that uses pred...
Increasingly, people are sharing sensitive personal information via online social networks (OSN). While such networks do permit users to control what they share with whom, access control policies are notoriously difficult to configure correctly; this raises the question of whether OSN users’ privacy settings match their sharing intentions. We present the results of an empirical evaluation that ...
We consider the problem of designing optimal linear codes (in terms of having the largest minimum distance) subject to a support constraint on the generator matrix. We show that the largest minimum distance can be achieved by a subcode of a Reed-Solomon code of small field size. As a by-product of this result, we settle the GM-MDS conjecture of Dau et. al. in the affirmative.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید