نتایج جستجو برای: extends property protections to information
تعداد نتایج: 10791466 فیلتر نتایج به سال:
for several years, researchers in familiarity of efl teachers with post-method and its role in second and foreign language learners’ productions have pointed out that the opportunity to plan for a task generally develops language learners’ development (ellis, 2005). it is important to mention that the critical varies in language teaching was shown is the disappearances of the concept of method ...
This paper conducts a crosscountry empirical study of the impact of institutions and agency conflicts on ownership reforms and their implications for changes in performance and efficiency. We examine two main questions. First, we evaluate the effects of certain property rights and institutional quality measures on performance and efficiency. We find that property rights and contracting rights p...
Although the Federal Health Privacy Rule has evened out some of the inconsistencies between states' health privacy laws, gaps in protection still remain. Furthermore, the Federal Rule contains some lax standards for the disclosure of health information. State laws can play a vital role in filling these gaps and strengthening the protections afforded health information. By enacting legislation t...
With the emergence and development of ICT especially the Internet, intellectual property law have been facing new challenges. Electronic tools and other new ICTs have provided new and unique opportunities for humanity to produce and duplicate works; however, they have also increased the potential of the breach of authors' rights which is not comparable to the tools used in the few past decades....
Artificial Intelligence (AI) is one of the most significant information and communications technologies being applied to surveillance. AI’s proponents argue that its promise great, successes have been achieved, whereas detractors draw attention many threats embodied in it, some which are much more problematic than those arising from earlier data analytical tools. This article considers full gam...
in the first chapter we study the necessary background of structure of commutators of operators and show what the commutator of two operators on a separable hilbert space looks like. in the second chapter we study basic property of jb and jb-algebras, jc and jc-algebras. the purpose of this chapter is to describe derivations of reversible jc-algebras in term of derivations of b (h) which are we...
Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encryption. In such a system, users' private keys are linked to their access rights. We note that if a user can generate a new private key for a portion of his/her access right, this could potentially lead to some undesirable situations, which violate the access control policy. Interestingly, to date...
Welch & Peers (1963) used a root-information prior to obtain posterior probabilities for a scalar parameter exponential model and showed that these Bayes probabilities had the confidence property to second order asymptotically. An important undercurrent of this indicates that the constant information reparameterization provides location model structure, for which the confidence property ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید