Zobrazeno 1 - 10
of 328
pro vyhledávání: '"Deep linking"'
Publikováno v:
Padjadjaran: Jurnal Ilmu Hukum, Vol 1, Iss 3, Pp 468-479 (2014)
Abstrak Framing, meta tags, dan deep linking semakin marak terjadi dalam berbagai transaksi elektronik, khususnya yang berkaitan dengan pemanfaatan dan penggunaan merek dalam aktivitas di internet. Hal ini menimbulkan berbagai masalah hukum baru.
Externí odkaz:
https://doaj.org/article/4e79d3336ec64d288bc13b64b177be4e
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030819958
The variety of video content sources is increasing every day, ranging from linear broadcast TV to multiple providers of video streaming over the internet, either over-the-top (OTT) platforms or user-generated content (UGC). However, most of this cont
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5f87602b5aa37b2d520b2178382897fe
https://doi.org/10.1007/978-3-030-81996-5_2
https://doi.org/10.1007/978-3-030-81996-5_2
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
GetMobile: Mobile Computing and Communications. 20:34-38
Web deep links are instrumental to many fundamental user experiences, such as navigating from one web page to another, bookmarking a page, or sharing it with others. Such experiences are not possible with individual pages inside mobile apps, since hi
Publikováno v:
IEEE Transactions on Software Engineering. 44:384-411
The prevalence of smart mobile devices has promoted the popularity of mobile applications (a.k.a. apps). Supporting mobility has become a promising trend in software engineering research. This article presents an empirical study of behavioral service
Autor:
Yong Wan
Publikováno v:
Computer Law & Security Review. 33:876-883
It has long been a highly controversial issue as to whether deep linking constitutes a making available to the public. Chinese courts have two main ways of interpreting this: the server test and the substantive substitution test. Beijing Intellectual
Publikováno v:
The Journal of Supercomputing. 74:6646-6664
In the IoT environment, all devices are connected to each other, and mobile device is considered as key device. But hacking into mobile devices is increasing rapidly with the increase in mobile device users. As the market share of Android OS increase
Publikováno v:
The Journal of Supercomputing. 73:4466-4492
Mobile cloud computing augments the resource-constrained mobile devices to run rich mobile applications by leveraging the cloud resources and services. Compute-intensive mobile apps require significant communication resources for migrating the code f
Autor:
Li Xinxiao, Akira Kuroda
Publikováno v:
BDIOT
With visual analysis of a large IoT system where structured and unstructured datasets are collected from various distributed data sources or their edge processing units, it is analytically meaningful to have an integrated visualization composed of mu
Autor:
Mao Rui
Publikováno v:
International Journal of Law and Society. 4:54
In the era of infringement 3.0, deep linking has become a typical behavior of network communication, and disputes frequently occur. However, since its inception, deep linking has always been in a gray area between legal and illegal, causing the court