نتایج جستجو برای: User’s violations

تعداد نتایج: 222582  

2009
Oshani Seneviratne Lalana Kagal Tim Berners-Lee

The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research data, social networks, blogs, photo sharing sites and other such applications known collectively as the Social Web, and even general purpose Web sites, have lots of increasingly complex information. Such information from...

2016
Nadin Kökciyan Pinar Yolum

Online social networks contain plethora of information about its users. While users enjoy sharing information online, not all information is meant to be seen by the entire network. Managing the privacy of users has become an important aspect of such online networks. An important part of this is detecting privacy violations and notifying the users so that they can take appropriate actions. While...

2016
Priyanka Patel Sherlock A. Licorish Bastin Tony Roy Savarimuthu Stephen G. MacDonell

With information technology mediating most aspects of contemporary societies, it is important to explore how human-oriented concepts may be leveraged to explore human actions in this new dispensation. One such concept is expectation violations. Expectations govern nearly all aspect of human interactions. However, while this phenomenon has been studied in human-human contexts where violations ar...

2016
Nadin Kökciyan Pinar Yolum

In this demonstration, we present PriGuardTool, which is a Web-based tool that can detect privacy violations in online social networks and notify the users accordingly. Our tool comes up with an interface where the users input their privacy concerns. An agent represents a user in the online social network. Each agent is responsible for generating commitments between its user and the system to m...

Journal: :Physical review letters 2005
M Glück P Jimenez-Delgado E Reya

Predictions of isospin asymmetries of valence and sea distributions are presented which are generated by QED leading Oalpha photon bremsstrahlung effects. Together with isospin violations arising from nonperturbative hadronic sources (such as quark and target mass differences) as well as with even a conservative contribution from a strangeness asymmetry (s not equal to s), the discrepancy betwe...

1996
Suzanne M. Embury

We consider the problems of coping with violations of semantic integrity constraints in applications requiring long-duration, user-controlled transaction. Such a transaction will typically violate many constraints, and will have a complicated semantics that is non-trivial to repair. We propose an approach to the related problems of explaining integrity violations, and presenting possible repair...

Journal: :Pravo 2022

The Court of Justice the European Union has recently issued a judgment in joined cases C-682/18 (YouTube) and C-683/18 (Cyando) relating to operator's liability for copyright infringements committed by users its platform within meaning Art. 3, paragraph 1 Directive 2001/29 on information society. In cited Luxembourg, there are two specific platforms being concerned: popular video-sharing file h...

Journal: :IEEE Trans. Knowl. Data Eng. 2016
Nadin Kökciyan Pinar Yolum

Social network users expect the social networks that they use to preserve their privacy. Traditionally, privacy breaches have been understood as malfunctioning of a given system. However, in online social networks, privacy breaches are not necessarily a malfunctioning of a system but a byproduct of its workings. The users are allowed to create and share content about themselves and others. When...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید