Statistics: Attacking an epidemic

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

eCAM: Attacking an Epidemic?

Diabetes 2, once reserved for those who are aging, is now rampant in adolescents in the USA. Obesity is the culprit brought on by poor eating habits, lack of exercise and a general malaise paradoxically due to wealth and not poverty (at least material). In our penultimate issue of eCAM supported by OUP, I aim to show certain advancements in evidence-based approaches. Diabetes is a condition in ...

متن کامل

The AIDS epidemic: update on laboratory statistics.

The first twelve years have seen major changes in the prevalence for human immunodeficiency virus. Our laboratory prevalence of HIV for the first half of 1993 is 0.05 (5 cases per 1,000). The gender ratio is 85:15 (male:female). The analysis of age versus prevalence indicates the greatest risk is for ages twenty to fortynine. The overall prevalence as a function of policy amount indicates the h...

متن کامل

An Approach to Deriving Maximal Invariant Statistics

Invariance principles is one of the ways to summarize sample information and by these principles invariance or equivariance decision rules are used. In this paper, first, the methods for finding the maximal invariant function are introduced. As a new method, maximal invariant statistics are constructed using equivariant functions. Then, using several equivariant functions, the maximal invariant...

متن کامل

Attacking an OT-Based Blind Signature Scheme

—In this paper, we describe an attack against one of the Oblivious-Transfer-based blind signatures scheme, proposed in [1]. An attacker with a primitive capability of producing specific-range random numbers, while exhibiting a partial MITM behavior, is able to corrupt the communication between the protocol participants. The attack is quite efficient as it leads to a protocol communication corru...

متن کامل

Attacking an Obfuscated Cipher by Injecting Faults

We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 2014

ISSN: 0028-0836,1476-4687

DOI: 10.1038/509s50a