نتایج جستجو برای: being the owner
تعداد نتایج: 16066560 فیلتر نتایج به سال:
AllNet is a new networking protocol designed to provide communication utilizing all available means, including Internet and cellular communications, but when these are not available, also ad-hoc networking and delay-tolerant networking. These latter mechanisms are best for low-bandwidth communications. Effective support of low-bandwidth networking needs message prioritization, which can benefit...
human advancements in science and technology have also developed to libraries leading to the emergence of the phenomenon of the digital libraries. therefore, authors decided to open the new view in the development of science and technology by examining both the copyright and digital library. it seems that in the digital library we must distinguish between two types of public and private librari...
competition is against monopoly and intellectual property creates monopoly for intellectual property owner. this article had been paid cooperation between apparently contradictory policies. exhaustion, parallel imports, compulsory license, intellectual property exploitation contract that coincide with competition are methods of cooperation between intellectual property and competition law. comp...
In this paper, we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is te...
In this paper we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is ter...
A novel method for introducing a back-up system to an active compressor surge control system is presented in this paper. Active surge control is a promising method for extending the compressor map towards and into the unstable area at low mass flow by stabilizing the surge phenomenon. The method also has potential for allowing operation at higher efficiencies. However, a failure in the active s...
the paper attempts to study the efficiency of crop production and resource use effi-ciency on temple tenants and owner farms in tirunelveli district of tamil nadu. a sam-ple of 90 temple tenants and 50 owner farmers from two taluks of tirunelveli district, nawely, shencottah and tenkasi were selected for the study. the reference period of the study was 2002-2003. the efficiency analysis with th...
In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent's route information from being misused by sites en route to collect proole information of the agent's owner. Furthermore , it is shown that the protected route resists at...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید