Essays about: "Data Control Language"

Showing result 6 - 10 of 132 essays containing the words Data Control Language.

  1. 6. The Integration of Chinese Internet Neologisms into Everyday Language: An Empirical Study Using Baidu Index and Online Surveys

    University essay from Lunds universitet/Kinesiska; Lunds universitet/Masterprogram: Språk och språkvetenskap

    Author : Weicheng Li; [2023]
    Keywords : Internet neologisms; language integration; search trends; familiarity; patterns; Languages and Literatures;

    Abstract : The emergence of the Internet language has profoundly impacted everyday communication in China. This study examines the integration of Chinese Internet neologisms into everyday language. READ MORE

  2. 7. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 8. Knowledge Transfer from multinational corporations’ headquarters to their subsidiaries : The methods of transferring knowledge (Explicit & Tacit)

    University essay from Högskolan i Gävle/Avdelningen för ekonomi

    Author : Monir Hossain; Ariful Islam; [2023]
    Keywords : Headquarter HQ ; Knowledge Transfer KT ; Knowledge transfer process KTP ; Multinational Comapnies MNCs ; Knowledge base theory KBT ; Knowledge base view KBV .;

    Abstract : Background: Globalization, technological advancement and opportunity of capturing new markets have pushed business organizations to expand their business in the inter- national market. As a result, companies have established their subsidiaries in the host country and control their business from headquarters. READ MORE

  4. 9. The Effectiveness of Child-Centered Play Therapy in reducing externalizing behavior problems and improving socio-emotional Functioning of Children : A Systematic Literature Review

    University essay from Jönköping University/HLK, CHILD

    Author : Mahsa Vazifehghelichi; [2023]
    Keywords : play therapy; child-centered play therapy; externalizing behavior problems; socio-emotional competencies;

    Abstract : Externalizing behavior problems in children reflect negative actions toward the external environment and can have detrimental consequences for their academic, social, and mental well-being. These actions range from breaking the rules to exhibiting extremely disruptive and aggressive behaviors, and they frequently come with issues with social behavior and emotional control. READ MORE

  5. 10. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Arvid Bergman Thörn; [2023]
    Keywords : Business Process Management; Imperative modelling; Declarative constraints; Conformance checking; Process querying; Process Mining;

    Abstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE