نتایج جستجو برای: authorized exploiters
تعداد نتایج: 6369 فیلتر نتایج به سال:
Interfaces | the collection of procedures and data structures that deene a library, a subsystem, a module | are syntactically poor programming languages. They have state (deened both by the interface's data structures and internally), operations on this state (deened by the interface's procedures), and semantics associated with these operations. Given a way to incorporate interface semantics in...
Received: 7 April 2010 Revised: 7 December 2010 Accepted: 13 December 2010 Abstract Studying knowledge strategy empirically requires that specific strategies be operationalized. In this paper, two existing knowledge strategy typologies (the Bierly & Chakrabarti typology of Loners, Explorers, Exploiters and Innovators and the von Krogh, Nonaka & Aben typology of Leveraging, Expanding, Appropriat...
The evolution of cooperation among nonrelated individuals is one of the fundamental problems in biology and social sciences. Reciprocal altruism fails to provide a solution if interactions are not repeated often enough or groups are too large. Punishment and reward can be very effective but require that defectors can be traced and identified. Here we present a simple but effective mechanism ope...
Mutualisms require protection from non-reciprocating exploiters. Pseudomyrmex workers that engage in an obligate defensive mutualism with Acacia hosts feed exclusively on the sucrose-free extrafloral nectar (EFN) that is secreted by their hosts, a behaviour linking ant energy supply directly to host performance and thus favouring reciprocating behaviour. We tested the hypothesis that Acacia hos...
The construction of reciprocal relationships requires cooperative interactions during the initial meetings. However, cooperative behavior with strangers is risky because the strangers may be exploiters. In this study, we show that people increase the likelihood of cooperativeness of strangers by using lightweight non-risky interactions in risky situations based on the analysis of a social netwo...
This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows between applets are authorized. We illu...
Abstract This study explores how an extreme far-right alternative media site uses content from professional to convey uncivil news with antisemitic message. Analytically, it rests on a critical discourse analysis of 231 items, originating established national and international sources, published Frihetskamp 2011–2018. In the study, we explore items are recontextualised portray both overt covert...
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigated to overcome the problems in hand. This paper proposes hiding secret messages, represented as a binary image, by covering a binary random texture synthesized from a 2D Ising Markov random field with an authorized RSA...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید