نتایج جستجو برای: expire

تعداد نتایج: 549  

1996
Elisa Bertino Claudio Bettini Elena Ferrari Pierangela Samarati

Several formal models for database access control have been proposed. However, little attention has been paid to temporal issues like authorizations with limited validity or obtained by deductive reasoning with temporal constraints. We present an access control model in which authorizations contain periodic temporal intervals of validity. An authorization is automatically granted in the time in...

Journal: :Reumatologia clinica 2013
Rolando Espinosa Morales Alejandro Díaz Borjón Leonor Adriana Barile Fabris Jorge Antonio Esquivel Valerio Gabriel Medrano Ramírez César Alejandro Arce Salinas Eduardo Rubén Barreira Mercado Mario Humberto Cardiel Ríos Efraín Díaz Jouanen Francisco Javier Flores Murrieta Antonio Fraga Mouret Mario Alberto Garza Elizondo Miguel Luján Estrada Francisco José Muñoz Barradas Juan Osvaldo Talavera Piña Olga Lidia Vera Lastra

Biotechnological drugs (BTDs) are complex molecules whose manufacturing process precludes the ability to identically reproduce the structure of the original product, and therefore there cannot be an absolute equivalence between the original (innovative) medication and its biosimilar counterpart. BTDs have been proven useful in the treatment of several rheumatic diseases, however their high cost...

2004
Y M Barilan

This paper presents and discusses a recent Israeli proposal to legislate on the rights of the dying patient. A gap exists between elitist biases of the committee proposing the law, and popular values and sentiments. The proposed law divides the dying patients into two groups: ‘‘those who wish to go on living’’ and ‘‘those who wish to die’’. The former will have a right to life prolonging extrao...

2013
Ajit Kumar Shrivastava

Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery ...

2006
Joseph Spencer

that directs and is the cause of everything.” [1] With moments to expire before Athens would execute him, Plato’s Socrates was exploring the meaning of a few lines by another philosopher. To the last minute of Socrates’ dramatic life, Plato has him making important criticism on vital literary texts. Textual criticism is found throughout Plato’s works, making it his main philosophical methodolog...

2009
Paul Saenger

As the first wave of biopharmaceuticals is set to expire, biosimilars or follow-on protein products (FOPPs) have emerged. The regulatory foundation for these products is more advanced and better codified in Europe than in the US. Recent approval of biosimilar Somatropin (growth hormone) in Europe and the US prompted this paper. The scientific viability of biosimilar growth hormone is reviewed. ...

2006
Ren-Junn Hwang Chih-Hua Lai Yun-Ru Chen Yu-Kai Hsiao

The security of general wireless network protocols is based on a wired equivalent privacy (WEP) protocol. Many researches point out that WEP involved a lot of security weaknesses. The wireless network based on WEP is not secure at all. This paper proposes a new key management scheme (named improved WEP*) that is compatible to IEEE 802.11 standard. The scheme not only improves confidentiality, b...

2005
Lukasz Golab Piyush Prahladka M. Tamer Özsu

A popular method of bounding the memory requirements of queries over data streamsis to use a sliding window, where old data are continuously removed as new data arrive.One problem that has not been addressed previously concerns indexing the results of slidingwindow queries. This is a noteworthy problem because data stream systems often materializecommon sub-expressions or final ...

2005
Xiaoyuan Gu Dirk Xiaoming Fu

Real-time interactive multimedia applications are highly delay-sensitive, and packets that are out of delay boundaries are usually obsolete. However the current Internet Protocol lacks a way to control the lifetime of the packets explicitly. We propose a packet lifetime control mechanism called Explicit Delay Control (EDC) that embeds a Maximum Tolerable Delay (MTD) field in an IPv4 option. At ...

2004
Jocelyn Benson Heather Gerken

The Voting Rights Act of 1965 forever changed the face of electoral equality in the United States. Today, almost forty years later, the Act is considered one of the most pivotal pieces of federal legislation in our country’s history and the “most successful piece of civil rights legislation ever enacted.” Congress has revisited various segments of the Act ave times since its enactment. A key 19...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید