نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

Journal: :Zbornik radova Pravnog fakulteta Nis 2018

2014
Laura J. Hickman Jennifer Wong Marika Suttorp

The present study examines the long term recidivism patterns of a group of unauthorized immigrants identified to be at high risk of recidivism. Using a sample of 517 male unauthorized immigrants, we used three measures of recidivism to assess nine-year rearrest differences between unauthorized immigrants who have and who have not been previously removed from the United States. Results indicate ...

Journal: :IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 1998
Nasir D. Memon Ping Wah Wong

Digital watermarks have previously been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer...

Journal: :journal of rangeland science 2014
abolfazl sharifiyan bahraman hossein barani ahmad abedi sarvestani abolfazl haji mollahoseini

rangelands are known as one of the main income resources for their exploiters.in the recent century, management of iran rangeland has undergone vast transformationsbecause of vulnerable socio-economic conditions of pastoralists. a study was done toprovide a clear picture of the status and utilization of aq qala rangelands via assessinginternal and external environmental factors affecting the ut...

2006
Csilla Farkas Alexander Brodsky Sushil Jajodia

In this paper we study the problem of providing controlled access to confidential data stored in semistructured databases. More specifically, we focus on privacy violations via data inferences that occur when domain knowledge is combined with nonprivate data. We propose a formal model, called Privacy Information Flow Model, to represent the information flow and the privacy requirements. These p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید