نتایج جستجو برای: permission
تعداد نتایج: 26829 فیلتر نتایج به سال:
belief in the lofty positions and excellences of the shi’īte imams (a.s.) and having faith in their miraculous acts and dominion over the world affairs underlies the authentic doctrine of unconditional guardianship (wilāya al-takwīnī). when the imams’ devotees try to maintain a demigod status for the imams in line with this – possibly loving and devotional – belief beyond the conventional limit...
Note The lecture on computer viruses (Gresham College, London, 6pm 21 February 2002) will include discussion of real viruses, details of how they work, and discussion of how they may be tackled. These notes provide some background, history, and further information. Computers can do anything: from running spreadsheets, word processors, power stations to music synthesisers and missile control s...
In the literature various models of games with restricted cooperation can be found. In those models, instead of allowing for all subsets of the set of players to form, it is assumed that the set of feasible coalitions is a proper subset of the power set of the set of players. In this paper we consider such sets of feasible coalitions that follow from a permission structure on the set of players...
In games with a permission structure it is assumed that players in a cooperative transferable utility game are hierarchically ordered in the sense that there are players that need permission from other players before they are allowed to cooperate. We provide axiomatic characterizations of Banzhaf permission values being solutions that are obtained by applying the Banzhaf value to modified TU-ga...
Access control technology is critical to the safe and reliable operation of information systems. However, owing massive policy scale number access entities in open distributed systems, such as big data, Internet Things, cloud computing, existing permission decision methods suffer from a performance bottleneck. Consequently, large time overhead affects normal business services. To overcome above...
Detecting Android malware is imperative. Among various detection schemes, permission pair based ones are promising for practical detection. However, conventional schemes cannot simultaneously meet requirements use in terms of efficiency, intelligibility, and stability performance. Although the latest scheme relies on differences frequent pairs between benign apps malware, it stability. This bec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید