نتایج جستجو برای: program misuse
تعداد نتایج: 469764 فیلتر نتایج به سال:
We present a software system, CodeStats, to empirically validate the prevalence of syntactic patterns in real-world codebases. Our prototype implementation supports only Java codebases. A domain-speci c language for queries facilitates concise expression of syntactic patterns, while also mitigating misuse of the CodeStats computational infrastructure. For scalability, a distributed system execu...
SCOTT E. BOWEN, Ph.D., is an associate professor and area chair of the Behavioral and Cognitive Neuroscience Program within the Department of Psychology at Wayne State University (WSU). He is also an associate professor in WSU’s Department of Obstetrics and Gynecology. His preclinical research is focused on behavioral pharmacology, behavioral toxicology, and neurobehavioral teratology. He inves...
Research demonstrating links between sensation-seeking and drug use, and sensation-seeking and participation in leisure activities suggests designing substance misuse prevention projects that encourage substituting alternative activities for drug use. The current study uses factor analysis and discriminant analysis to provide comprehensive information on the kinds of activities high-sensation s...
entaNYL transdermal patches (Duragesic and other generic brands) are a mainstay in the treatment of Fchronic pain, yet the US health care community and patients alike continue to face challenges regarding the safe use of this product. Despite numerous warnings from drug manufacturers, patient safety groups, and even the Food and Drug Administration (FDA), the Institute for Safe Medication Pract...
1 This research sponsored under grant F96-F154000-000NC, Office of Research and Development, CIA. Maria is an undergraduate (Junior) pursuing a BSEE in the Department of Electrical Engineering. Her research mentored by Dr. Wee, under the Women’s Engineering Link Mentorship program. Dr. Matt Bishop is her faculty sponsor. Christopher is a post-doctoral researcher in the Computer Security Laborat...
ion-Based Intrusion Detection The implementation of many misuse detection approaches shares a common problem: Each system is written for a single environment and has proved difficult to use in other environments that may have similar policies and concerns. The primary goal of abstraction-based intrusion detection is to address this problem. The initial attempt of the abstraction-based approach ...
During the past two decades, an increasing number of European countries have introduced language requirements for residency, citizenship, and sometimes even entry to country family reunification. As a result, democratic rights as well basic human come depend upon individual’s ability obtain certain score on test consequences failing may be detrimental. In field testing, this use tests is often ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید