The refugium theory revisited: exploiting juvenile fish while preserving large adults

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fast randomization of large genomic datasets while preserving alteration counts

MOTIVATION Studying combinatorial patterns in cancer genomic datasets has recently emerged as a tool for identifying novel cancer driver networks. Approaches have been devised to quantify, for example, the tendency of a set of genes to be mutated in a 'mutually exclusive' manner. The significance of the proposed metrics is usually evaluated by computing P-values under appropriate null models. T...

متن کامل

Preserving Data While Rendering

The fundamental premise of visualization is that a useful correspondence between pixels and data can be built. However, visualization programs rarely operate at the pixel level. Instead of the discrete, finite space of pixels, the most common visualization models work with canvases of floating-point coordinates and geometric shapes. Preserving some source data link all the way down to the pixel...

متن کامل

Large J expansion in ABJM theory revisited

Recently there has been progress in the computation of the anomalous dimensions of gauge theory operators at strong coupling by making use of the AdS/CFT correspondence. On the string theory side they are given by dispersion relations in the semiclassical regime. We revisit the problem of a large-charge expansion of the dispersion relations for simple semiclassical strings in an [Formula: see t...

متن کامل

Playfulness in Adults Revisited The Signal Theory in German Speakers

The authors elaborate on the role of playfulness as a preferred characteristic in potential long-term partners recently espoused by Garry Chick and others. They aim to replicate the findings of such research by studying a different culture (that of German-speaking countries) and to develop them further by taking into account the participants’ relationship status and individual differences in th...

متن کامل

Accessing Data while Preserving Privacy

As organizations struggle with vast amounts of data, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data privacy, while allowing efficient querying. Recent attacks on such systems (e.g., [37, 30]) demonstrate that outsourced database systems must trade-off efficiency and pri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scientia Marina

سال: 2015

ISSN: 1886-8134,0214-8358

DOI: 10.3989/scimar.2015.79n3285