Hunting by Scent

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coordinated Hunting by Cuban Boas

Coordinated hunting, in which individual predators relate in time and space to each other’s actions, is uncommon in animals, and is often difficult to distinguish from simply hunting in non-coordinated groups, which is much more common. The author tested if Cuban boas (Chilabothrus angulifer) hunting bats in cave passages take into account other boas’ positions when choosing hunting sites, and ...

متن کامل

Blood Scent

Blood cell production is tightly regulated by cell-intrinsic mechanisms and environmental factors. The study by Utpal Banerjee and colleagues and colleagues reveals that, in Drosophila, olfactory signals control hematopoietic progenitor maintenance, thus uncovering a physiological link between sensory perception and hematopoietic response to environmental stress.

متن کامل

Pathway hunting by random survival forests

MOTIVATION Pathway or gene set analysis has been widely applied to genomic data. Many current pathway testing methods use univariate test statistics calculated from individual genomic markers, which ignores the correlations and interactions between candidate markers. Random forests-based pathway analysis is a promising approach for incorporating complex correlation and interaction patterns, but...

متن کامل

Bug Hunting By Computing Range Reduction

We describe a method of model checking called Computing Range Reduction (CRR). The CRR method is based on derivation of clauses that reduce the set of traces of reachable states in such a way that at least one counterexample remains (if any). These clauses are derived by a technique called Partial Quantifier Elimination (PQE). Given a number n, the CRR method finds a counterexample of length le...

متن کامل

Hunting Obfuscated Malware by Abstract Interpretation

The Problem. A malware is a program with a malicious behaviour, that is designed to replicate with no user consent and to damage software and/or data on infected machines. Malware are generally classified according to their goals and propagation methods into viruses, worms, backdoors, Trojans, etc. A malware detector is a system that attempts to verify whether a program presents a malicious beh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1938

ISSN: 0028-0836,1476-4687

DOI: 10.1038/141451a0