نتایج جستجو برای: users violations

تعداد نتایج: 222582  

2001
Vijayshankar Raman Joseph M. Hellerstein

Cleaning data of errors in structure and content is important for data warehousing and integration. Current solutions for data cleaning involve many iterations of data “auditing” to find errors, and long-running transformations to fix them. Users need to endure long waits, and often write complex transformation scripts. We present Potter’s Wheel, an interactive data cleaning system that tightly...

2016
Guangjie Han Wenhui Que Gangyong Jia Lei Shu

Cloud computing has innovated the IT industry in recent years, as it can delivery subscription-based services to users in the pay-as-you-go model. Meanwhile, multimedia cloud computing is emerging based on cloud computing to provide a variety of media services on the Internet. However, with the growing popularity of multimedia cloud computing, its large energy consumption cannot only contribute...

2011
Omid Fatemieh Ali Farhadi Ranveer Chandra Carl A. Gunter

The emerging paradigm for using the wireless spectrum more efficiently is based on enabling secondary users to exploit white-space frequencies that are not occupied by primary users. A key enabling technology for forming networks over white spaces is distributed spectrum measurements to identify and assess the quality of unused channels. This spectrum availability data is often aggregated at a ...

2010
Jocelyn Simmonds Shoham Ben-David Marsha Chechik

Web service applications are distributed processes that are composed of dynamically bounded services. In our previous work [15], we have described a framework for performing runtime monitoring of web service against behavioural correctness properties (described using property patterns and converted into finite state automata). These specify forbidden behavior (safety properties) and desired beh...

2009
Leucio Antonio Cutillo Refik Molva Thorsten Strufe

Safebook tackles the security and privacy problems of online social networks. It puts a special emphasis on the privacy of users with respect to the application provider and provides defenses against intruders or malicious users. In order to assure privacy in the face of potential violations by the provider, Safebook is designed in a decentralized architecture. It relies on the cooperation amon...

2015
Umbreen Sabir Mian Jerry den Hartog Sandro Etalle Nicola Zannone

The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...

Journal: :Lecture Notes in Computer Science 2022

Abstract Hyperproperties relate multiple computation traces to each other. Model checkers for hyperproperties thus return, in case a system model violates the specification, set of as counterexample. Fixing erroneous relations between that led counterexample is difficult manual effort highly benefits from additional explanations. In this paper, we present an explanation method counterexamples d...

2010
Jocelyn Simmonds Shoham Ben-David Marsha Chechik

For a system of distributed processes, correctness can be ensured by (statically) checking whether their composition satisfies properties of interest. However, web services are distributed processes that dynamically discover properties of other web services. Since the overall system may not be available statically and since each business process is supposed to be relatively simple, we propose t...

ژورنال: حقوق پزشکی 2020

Patients are the main consumers of health care services and among the most vulnerable social classes. They are in a special situation because of the physical and emotional stresses caused by the illness as well as the financial burden of medical services. In contrast, the advancement, diversification and specialization of health care services have led patients to face a group called "health car...

ژورنال: بیمارستان 2018

Background: Administrative violations are a person-centered behavior that violates the accepted organizational norms, and thus, can threaten the organization health. Therefore, the present study aimed to identify the causes of prolonging the time of taken to deal with administrative violations were at the staff of Ministry of Health and Medical Education.   Materials and Methods: This study w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید