首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   65篇
  免费   0篇
各国政治   10篇
世界政治   5篇
外交国际关系   6篇
法律   12篇
中国共产党   3篇
中国政治   10篇
政治理论   10篇
综合类   9篇
  2023年   2篇
  2021年   1篇
  2020年   1篇
  2019年   2篇
  2018年   3篇
  2017年   8篇
  2016年   5篇
  2014年   6篇
  2013年   9篇
  2012年   5篇
  2011年   2篇
  2010年   4篇
  2009年   2篇
  2008年   4篇
  2007年   2篇
  2006年   2篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   2篇
  1999年   1篇
排序方式: 共有65条查询结果,搜索用时 0 毫秒
61.
62.
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists.  相似文献   
63.
In recent years, there has been an explosion of categories and labels to account for the expansion of forms of cooperation beyond the membership of the Development Assistance Committee. Such hype has led to the construction of the so‐called southern model as the archetype of development cooperation coming from non‐Development Assistance Committee countries that are somehow committed to the principles of the South–South cooperation. The present article challenges the idea of a southern model by providing an analysis of drivers, tools, and modality of development assistance.  相似文献   
64.
This article explores the roles metaphors and analogies play in architectural design thinking. Architects, planners, and designers use these cognitive tools extensively. While the linkages between metaphors, analogies, and design thinking are not new, how architects use them is not systematically explored. Metaphors and analogies are used idiosyncratically. What a particular metaphor or analogy signifies varies from person to person and could mean different things to different people. In this study two key findings emerge from the interviews with five prominent Iranian architects, who have used metaphors or analogies in their projects. First, this study confirms the other findings that designers use metaphors/analogies in three ways: problem solving, problem definition, and explaining a problem to others. At times architects post-rationalize metaphors or analogies, or use them after the fact instead of during the conceptual design stage; second, arguably, metaphors and analogies shed some light on broader issues of public concern, that is, the authenticity (originality) vs. imitation debate. This latter debate remains contentious within the Iranian architectural circles.  相似文献   
65.
To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates.One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号