نتایج جستجو برای: false requirement

تعداد نتایج: 233291  

2010
J. Gijs Kuenen Wil N. Konings

Storing and transporting of urine samples for doping analysis, as performed by the anti-doping organizations associated with the World Anti-Doping Agency, does not include a specific protocol for cooled transport from the place of urine sampling to the doping laboratory, although low cost cooling facilities can easily be made available. As a result, microbial and thermal degradation of the chem...

2013
Mirta Galesic Henrik Olsson Jörg Rieskamp

Research on human reasoning is dominated by demonstrations of the errors people make in various judgment and decision-making tasks. The area of social cognition is not an exception: the list of apparent errors is long and includes a number of contradictory phenomena. Here we explore a prominent example of the contradictory pairs of biases: false consensus and false uniqueness. We show in an emp...

Journal: :CoRR 2011
Massimo Melucci

Data management systems, like database, information extraction, information retrieval or learning systems, store, organize, index, retrieve and rank information units, such as tuples, objects, documents, items to match a pattern (e.g. classes and profiles) or meet a requirement (e.g., relevance, usefulness and utility). To this end, these systems rank information units by probability to decide ...

Journal: :Environmental Health Perspectives 1983
P Pedersen E Thomsen R M Stern

The replica plating method as developed by Lederberg has been used to differentiate between "true" and "false" histidine-requiring revertant bacterial colonies which develop on minimal agar plates in the Ames test. Strains of S. typhimurium LT2, TA 100, when exposed to either sodium dichromate or the fumes from the welding of stainless steel, develop colonies whose apparent numbers are directly...

1999
Rajeev Joshi

We show that the presence of even a single faulty process makes it impossible to design a strategy for fair allocation of a shared resource. A classic problem in distributed systems is the following resource allocation problem: given a set of processes sharing a resource, design a synchronisation mechanism that guarantees (i) mutual exclusion, i.e., at any moment, at most one process uses the r...

2014
Ming Hour Yang

Since adversaries may spoof their source IPs in the attacks, traceback schemes have been proposed to identify the attack source. However, some of these schemes' storage requirements increase with packet numbers. Some even have false positives because they use an IP header's fragment offset for marking. Thus, we propose a 16-bit single packet hybrid IP traceback scheme that combines packet marki...

2005
ROBERT D. SHOUMAKER

In 38 patients who underwent cerebrovascular evaluation followed by angiography the Doppler ultrasound scanning technique was found to be an excellent screening procedure for detecting marked stenosis (>50%) or occlusion of the internal carotid artery (93% correlation). It is noninvasive, easily reproducible and can be performed by a qualified technician. The major problems are: the inability t...

Journal: :Stroke 1978
R D Shoumaker S Bloch

In 38 patients who underwent cerebrovascular evaluation followed by angiography the Doppler ultrasound scanning technique was found to be an excellent screening procedure for detecting marked stenosis (greater than 50%) or occlusion of the internal carotid artery (93% correlation). It is noninvasive, easily reproducible and can be performed by a qualified technician. The major problems are: the...

2016
Patrick Venter

In 2014, in Foglia v. Renal Ventures Management LLC, the U.S. Court of Appeals for the Third Circuit evaluated the pleading requirements needed to satisfy Rule 9(b) of the Federal Rules of Civil Procedure, within the context of False Claims Act complaints. The Third Circuit concurred with the First, Fifth, and Ninth Circuits and determined that it is necessary to provide only reliable indicia t...

2008
Benfano Soewito Ning Weng

Intrusion detection system is a promising technique to improve Internet security. A daunting challenge in the design of this system is the requirement of simultaneous matching of hundreds to thousands of attack patterns at full wire speed. This paper presents a novel scheme to accelerate pattern matching by adding a prefilter to the exact pattern matching engines. This prefilter serves as a fas...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید