نتایج جستجو برای: Meddle East

تعداد نتایج: 108127  

2013
Ashwin Rao Arash Molavi Kakhki Abbas Razaghpanah Amy Tang Shen Wang Justine Sherry Phillipa Gill Arvind Krishnamurthy Arnaud Legout Alan Mislove David Choffnes

Researchers and mobile users have little visibility into the network traffic generated by mobile devices and have poor control over how, when, and where that traffic is sent and handled. This paper presents Meddle, a platform that leverages VPNs and software middleboxes to improve transparency and control for Internet traffic from mobile systems. Meddle provides a practical way to interpose on ...

Journal: :Microbe Magazine 2015

Masoome Nadiri Younes Nourbakhsh

Extremism is a notion, which becomes meaningful in democratic and lawful societies. This is sometimes interchangeable with the terms, Fundamentalism and terrorism. It is often said that one who aims to fight against terrorism, must first challenge and overcome extremism. Thus, Analysis of the potentials of extremism in a society is highly articulated. Whereas Fundamentalism intends to bring abo...

2013
Ashwin Rao

Mobile devices are increasingly becoming the primary device to access the Internet. Despite this thriving popularity, the current mobile ecosystem is largely opaque because of the vested monetary interests of its key players: mobile OS providers, creators of mobile applications, stores for mobile applications and media content, and ISPs. This problem of opaqueness is further aggravated by the l...

2004
Elad Lahav

Meddle is a programmer’s text editor designed to provide as-you-type semantic information to the user. This is accomplished by using algorithms for tracking changes to the editor’s text buffer, incremental scanning and incremental parsing. These algorithms are presented and ex-

Journal: :TinyToCS 2013
Amy Tang Ashwin Rao Justine Sherry David R. Choffnes

Increasing numbers of people use mobile devices to transmit personal information. Privacy consequently becomes an important issue. With the current Android permissions system, users may grant broad Internet access to an application, but are unable to see how exactly that access is used. We define a “well-behaved” application as one that: 1. only uses necessary resources, 2. contacts only necess...

2009
S. VIJAYA

Up to now, many algorithms have been introduced for computing reconstruction in grayscale images. But the execution time is required by the known grayscale reconstruction algorithms make their practical use rather cumbersome on conventional computers. A new algorithm is introduced to bridge this gap and reconstruct the image in better way. This is based on the notion of regional maxima, regiona...

Journal: :CoRR 2015
Sowmya K. N. H. R. Chennamma

The Digital Forgeries though not visibly identifiable to human perception it may alter or meddle with underlying natural statistics of digital content. Tampering involves fiddling with video content in order to cause damage or make unauthorized alteration/modification. Tampering detection in video is cumbersome compared to image when considering the properties of the video. Tampering impacts ne...

Journal: :Journal of Current Chinese Affairs 2022

The Chinese Communist Party (CCP) is currently in the throes of redefining itself as not just China's ruling party, but also dominant political force global China. Following path globalisation, this project overlaps with – different from much maligned strategy influencing and interfering society politics other countries. principal aim CCP's extension to meddle affairs countries, tying people, g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید