The refugium theory revisited: exploiting juvenile fish while preserving large adults
نویسندگان
چکیده
منابع مشابه
Fast randomization of large genomic datasets while preserving alteration counts
MOTIVATION Studying combinatorial patterns in cancer genomic datasets has recently emerged as a tool for identifying novel cancer driver networks. Approaches have been devised to quantify, for example, the tendency of a set of genes to be mutated in a 'mutually exclusive' manner. The significance of the proposed metrics is usually evaluated by computing P-values under appropriate null models. T...
متن کاملPreserving Data While Rendering
The fundamental premise of visualization is that a useful correspondence between pixels and data can be built. However, visualization programs rarely operate at the pixel level. Instead of the discrete, finite space of pixels, the most common visualization models work with canvases of floating-point coordinates and geometric shapes. Preserving some source data link all the way down to the pixel...
متن کاملLarge J expansion in ABJM theory revisited
Recently there has been progress in the computation of the anomalous dimensions of gauge theory operators at strong coupling by making use of the AdS/CFT correspondence. On the string theory side they are given by dispersion relations in the semiclassical regime. We revisit the problem of a large-charge expansion of the dispersion relations for simple semiclassical strings in an [Formula: see t...
متن کاملPlayfulness in Adults Revisited The Signal Theory in German Speakers
The authors elaborate on the role of playfulness as a preferred characteristic in potential long-term partners recently espoused by Garry Chick and others. They aim to replicate the findings of such research by studying a different culture (that of German-speaking countries) and to develop them further by taking into account the participants’ relationship status and individual differences in th...
متن کاملAccessing Data while Preserving Privacy
As organizations struggle with vast amounts of data, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data privacy, while allowing efficient querying. Recent attacks on such systems (e.g., [37, 30]) demonstrate that outsourced database systems must trade-off efficiency and pri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientia Marina
سال: 2015
ISSN: 1886-8134,0214-8358
DOI: 10.3989/scimar.2015.79n3285