نتایج جستجو برای: spying operation)

تعداد نتایج: 211944  

2014
M. Selvam

The robotics and automation industry which is ruled the sectors from manufacturing to household entertainments. It is widely used because of its simplicity and ability to modify to meet changes of needs. The project is designed to develop a robotic vehicle using android application for remote operation attached with wireless camera for monitoring purpose. The robot along with camera can wireles...

Journal: :Physical Review D 2015

2010
Jean Monnet Enrico Mattei Carlo Carraro Christophe Bravard

We consider a multimarket framework where a set of firms compete on two interrelated oligopolistic markets. Prior to competing in these markets, firms can spy on others in order to increase the quality of their product. We characterize the equilibrium espionage networks and networks that maximize social welfare under the most interesting scenario of diseconomies of scope. We find that in some s...

Journal: :JIP 2013
Ichita Higurashi Akira Kanaoka Masahiko Kato Eiji Okamoto

Gaining complete understanding of the active services and open communication paths is often difficult because of the rapidly expanding complexity of those services and their wide-ranging functions. Furthermore, the IT administrators of hand-designed systems often lack ways to identify and close unnecessary services and communication pathways. In this paper, firstly we propose an automated appro...

Journal: :Nature 2006

Journal: :Anthropology Today 2007

2009
P. Billand Jean Monnet C. Bravard S. Chakrabarti Sudipta Sarangi

We consider a multimarket framework where a set of firms compete on two interrelated oligopolistic markets. Prior to competing in these markets, firms can spy on others in order to increase the quality of their product. We characterize the equilibrium espionage networks and networks that maximize social welfare under the most interesting scenario of diseconomies of scope. We find that in some s...

2005
Georgios Kalogridis Chris J. Mitchell Gary Clemo

We introduce the notion of spy agents and describe how they can be deployed within diverse network protocol architectures in order to perform high fidelity trust assessments in remote environments. The spy agent framework developed here consists of: a spy agent structural architecture that instruments and instantiates spy agents with appropriate content; a spy agent routing framework that fabri...

Journal: :مطالعات حقوق خصوصی 0
محسن رهامی دانشکده حقوق و علوم سیاسی، دانشگاه تهران سیروس پرویزی دانشکده حقوق و علوم سیاسی، دانشگاه تهران

computer spying is considered as a crime, inducing computer as a criminal subject and material part of it. it is not possible, before discovering computer, so, most countries have no passed rules a bout it. internal law of our country has investigated activities such as illegal attaining into secret data ,damaging security and national interests 'in case of disclosing them, as computer spy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید