-
121
-
122
Complexity Analysis on the Supply Chain of Brand Enterprise Countermeasures against Imitation Threats
Published 2024-01-01Get full text
Article -
123
-
124
-
125
Robust Indoor Sensor Localization Using Signatures of Received Signal Strength
Published 2013-12-01Get full text
Article -
126
Joint Inventory, Pricing, and Advertising Decisions with Surplus and Stockout Loss Aversions
Published 2016-01-01Get full text
Article -
127
Prediction of China’s Express Business Volume Based on FGM (1, 1) Model
Published 2021-01-01Get full text
Article -
128
Optimal Scheduling for Retrieval Jobs in Double-Deep AS/RS by Evolutionary Algorithms
Published 2013-01-01Get full text
Article -
129
Public Librarians’ Needs for in-service Training in Turkey
Published 2013-11-01“…In the research, 106 librarians, 37 directors / vice directors are exemplifıed out of the total number of 143 graduates of Department of Information Management. The questionnaire was applied to all subjects in Ja- nuary and February 2008. …”
Get full text
Article -
130
Master of Information Science (MIS)
Published 2022“…The main objective of the program is to raise the profile of the profession by producing highly trained professionals who are competent and proficient in matters pertaining to information management.…”
Get full text
Other -
131
A hierarchical access control scheme based on Lagrange interpolation for mobile agents
Published 2018-07-01Get full text
Article -
132
-
133
Deep learning-based object detection algorithms in medical imaging: Systematic review
Published 2025-01-01Get full text
Article -
134
Mapping information systems maturity: the case of the Portuguese hospitality industry
Published 2021-10-01Get full text
Article -
135
Business Processes Modeling Recommender Systems: User Expectations and Empirical Evidence
Published 2018-04-01Get full text
Article -
136
-
137
Privacy protection system based on Hook for Android
Published 2018-04-01“…A privacy protection system based on Hook technology was designed and implemented to address the problem of user privacy leakage caused by malicious applications in Android.The system consists of three modules:application classification module,privacy information management module and collusion attack management module.The application classification module constructs classification model by using permission feature vectors and then classifies mobile applications into malicious applications and normal applications.The privacy information management module hooks all privacy-related application programming interfaces (API) based on Hook technology and then intercepts malicious applications by returning false data or empty data.The collusion attack management module hooks all inter-application communication channels and then intercepts corresponding communication contents by using the permission rules of collusion attack.Finally,the proposed privacy protection scheme on Android virtual machine was implemented to prove and its feasibility and effectiveness were proved.In addition,the system can intercept application behaviors of breaching privacy in real time with less memory,which does not need to modify Android system and applications.…”
Get full text
Article -
138
A Blocking-Aware Scheduling for Real-Time Task Synchronization Using a Leakage-Controlled Method
Published 2014-02-01Get full text
Article -
139
Evolution of Bounded Confidence Opinion in Social Networks
Published 2017-01-01Get full text
Article -
140