نتایج جستجو برای: disable

تعداد نتایج: 1148  

2004
A. Aguiló M. Gonzalez

In many applications the study of human movement using a computer vision and graphics techniques is very useful. One of these applications is the three-dimensional reconstruction of the structure of the human body and its movement using sequences of images and biomechanical graphics models. We present a special study about disable people and swimming activities, high level competition in partic...

2013
Elena M. Seco John C. Zinder Carol M. Manhart Ambra Lo Piano Charles S. McHenry Silvia Ayora

Complex viruses that encode their own initiation proteins and subvert the host's elongation apparatus have provided valuable insights into DNA replication. Using purified bacteriophage SPP1 and Bacillus subtilis proteins, we have reconstituted a rolling circle replication system that recapitulates genetically defined protein requirements. Eleven proteins are required: phage-encoded helicase (G4...

2002
Martin Carlsson Jakob Engblom Andreas Ermedahl Jan Lindblad Björn Lisper

Worst-Case Execution Time (WCET) analysis has been around for some time now, but has so far not been much used to analyse real production codes. Here, we present a case study where static WCET analysis was used to find upper time bounds for time-critical regions in a commercial real-time operating system. We report on practical experiences from the work, like the reverse engineering required to...

2018
Reid Oldenburg Veronique Mayau Jacques Prandi Ainhoa Arbues Catherine Astarie-Dequeker Christophe Guilhot Catherine Werts Nathalie Winter Caroline Demangel

Phenolic glycolipids (PGLs) are cell wall components of a subset of pathogenic mycobacteria, with immunomodulatory properties. Here, we show that in addition, PGLs exert antibactericidal activity by limiting the production of nitric oxide synthase (iNOS) in mycobacteria-infected macrophages. PGL-mediated downregulation of iNOS was complement receptor 3-dependent and comparably induced by bacter...

Journal: :Biochemical Society transactions 2010
María Dolores Vázquez-Novelle Lesia Mirchenko Frank Uhlmann Mark Petronczki

Two closely connected mechanisms safeguard the fidelity of chromosome segregation in eukaryotic cells. The mitotic checkpoint monitors the attachment of kinetochores to microtubules and delays anaphase onset until all sister kinetochores have become attached to opposite poles. In addition, an error correction mechanism destabilizes erroneous attachments that do not lead to tension at sister kin...

2010
Friedrich Otto

We introduce a new mode of operation for CD-systems of restarting automata by providing explicit enable and disable conditions in the form of regular constraints. We show that, for each CD-systemM of restarting automata and each mode m of operation considered by Messerschmidt and Otto, there exists a CD-systemM′ of restarting automata of the same type asM that, working in the new mode ed, accep...

2003
Christian Collberg Stephen Kobourov Edward Carter

In this paper, we discuss graph-theoretic approaches to software watermarking and fingerprinting. Software watermarking is used to discourage intellectual property theft and software fingerprinting is used to trace intellectual property copyright violations. We focus on two algorithms that encode information in software through the use of graph structures. We then consider the different attack ...

2001
Peter Mell Donald Marks Mark McLarnon

As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...

2007
Igor Vujović Danko Kezić Ratomir Vujović

In this article, teleoperation over Internet is considered. A significant problem in teleoperations occurs if data is lost or late. This can lead to the fatal error in command decisions made by operator. Since operator must decide based on data on the client side of the link, modifications presented here are on the client side of the teleoperation system. Visual data was of particular concern. ...

Journal: :JAMA 2013
Jeffrey T Kullgren Katia A Duey Rachel M Werner

continuous kinematic and video data from 2600 drivers of passenger vehicles. It will provide further evidence on whether hands-free cell phone use poses an increased risk for crashes. We applaud legislative and regulatory efforts attempting to address the problem of distracted driving, and we encourage additional research to determine the risks imposed by various types of distractions. However,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید