نتایج جستجو برای: drug misuses

تعداد نتایج: 590094  

Journal: :IJMCMC 2013
Abidah Hj Mat Taib Wan Nor Ashiqin Wan Ali Nurul Sharidah Shaari

IPv6 existence has increased the challenges in maintaining security of an enterprise network. Besides taking a good care of the network operation and activities, analyzing the network vulnerabilities during IPv6 deployment is necessary. Some specific IPv6 vulnerabilities that are commonly debated are reconnaissance attacks, misuse of routing header type 0 (RH0), misuse of multicast, and misuse ...

Journal: :J. Inf. Sci. Eng. 2007
Jongmoo Choi

The loadable kernel modules supported by Linux provide many benefits including a small-sized kernel, on-demand loading, and simpler upgrading of software. However, modules are executed in a privileged mode so that trivial errors in a module may cause a critical system halt or deadlock situations. We introduce a kernel resource protector which shields the kernel from faults generated by modules....

2016
Matthew A. Hammer Joshua Dunfield

Nominal memoization combines memoized functional programming with a controlled form of imperative cache effects. By leveraging these imperative effects, nominal memoization can dramatically outperform traditional (“structural”) memoization. However, the nominal memoization programming model is error-prone: when the programmer unintentionally misuses names, their incremental program ceases to co...

2008
Wei Liu Ben Allison Louise Guthrie

The Internet has become a very popular platform for communication around the world. However because most modern computer keyboards are Latin-based, Asian language speakers (such as Chinese) cannot input characters (Hanzi) directly with these keyboards. As a result, methods for representing Chinese characters using Latin alphabets were introduced. The most popular method among these is the Pinyi...

2017
Shuai Hao Haining Wang

DNS cache plays a critical role in domain name resolution, providing (1) high scalability at Root and Top-level-domain (TLD) name servers with reduced workloads and (2) low response latency to clients when the resource records of the queried domains are cached. However, the pervasive misuses of domain names, e.g., the domains of “one-time-use” pattern, have a negative impact on the effectivenes...

Journal: :CoRR 2012
Mohammad Sazzadul Hoque Md. Abdul Mukit Md. Abu Naser Bikas

Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. There are various appro...

2011
Ralph E. Gomory William J. Baumol

This paper examines international trade issues as vital indicators of the economic prospects of the United States and other developed economies. In particular, it challenges misuses of the doctrine of mutual gains from trade and instead argues that comparative advantage does not guarantee increases in benefits to both trading partners—especially when one partner seeks to distort the market mech...

Journal: :JAMA 2001
F S Collins V A McKusick

The year 2000 marked both the start of the new millennium and the announcement that the vast majority of the human genome had been sequenced. Much work remains to understand how this "instruction book for human biology" carries out its multitudes of functions. But the consequences for the practice of medicine are likely to be profound. Genetic prediction of individual risks of disease and respo...

Journal: :Paediatrics & child health 2010
S Albersheim

E-mail has become a commonplace 'procedure' in medical practice because it is efficient and inexpensive. However, there are potential misuses and abuses of this form of written communication, with clinical and ethical implications.Common uses of e-mail in paediatics include general communication with colleagues in a professional setting; electronic formal consultation, in which patient confiden...

2011
A. Ushapriya M. Subramani

With the evolution of consumer electronics technologies, personal information in consumer devices is becoming increasingly valuable. To protect private information from misuses due to the loss or theft, secure user identification mechanisms should be equipped into the consumer devices. Biometrics based personal identification is regarded as an effective method for automatically recognizing, wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید