نتایج جستجو برای: permission
تعداد نتایج: 26829 فیلتر نتایج به سال:
* The views expressed in this paper are solely those of the authors and are not in any way endorsed by the Federal Reserve or the OECD. The authors are also solely responsible for any errors or omissions.
Android being a leading and the most popular operating system for smart phones and tablets, has also become a prime target for the attackers due to its growing users and it being an open source platform. This document describes the work done in detecting malware in the Android platform by performing static analysis on the permission based framework in Android platform. In our work, we have extr...
PREDICTING RISK FACTORS FOR INTIMATE PARTNER VIOLENCE 4 The current conflicts in Afghanistan and Iraq present unique risk factors for military personnel that increase the likelihood of psychological distress and concomitant consequences related to trauma. Several studies have found that the stress brought about by financial difficulties, unemployment, and the need to renegotiate roles and respo...
We address the entailment problem for separation logic with symbolic heaps admitting list predicates and permissions for memory cells that are essential to express ownership of a heap region. In the permission-free case, the entailment problem is known to be in P. Herein, we design new decision procedures for solving the satisfiability and entailment problems that are parameterised by the permi...
As developing countries seek to improve their economic prospects, electricity reform has been widely viewed as a central part of this effort. While the focus of most research to date has been at economy or utility level; there has been much less research on regional outcomes. India presents a unique case, as its states share a common economic and political system, whilst having been given consi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید