نتایج جستجو برای: emptive attack

تعداد نتایج: 82661  

Journal: :Bone Marrow Transplantation 2000

2014
R. Sebastian J. D. Tobias

Hereditary angioedema is a rare disorder caused by the congenital deficiency or dysfunction of C1 inhibitor. The deficiency results in recurrent episodes of angioedema, mainly involving the mucosa and skin. The most common clinical manifestations are the result of edema in the subcutaneous tissue, abdominal mucosa, and laryngeal tissue. Laryngeal involvement remains the most serious due to the ...

2011
Daniel G Arce Rachel TA Croson Catherine C Eckel

Experimental research has a long-established tradition in psychology and sociology, and a more recent but important history as a useful methodology in economics. In this article, we discuss the strengths and weaknesses of experiments as a method for studying terrorism and other national security topics. For example, given the paucity of data on counterterror policy decisions by governments, as ...

2014
Peter Matthews Graham Coates

This paper describes a significant revision to the Concurrent Engineering (CE) methodology that enables a shortened project completion time. Under the CE methodology, sequential tasks can only be performed as such. We introduce a method for starting sequential tasks concurrently using a pre-emptive approach. Where there are a, suitably small, finite number of possible alternative subsequent tas...

1998
Lars Lundberg

Real-time systems often consist of a number of independent processes which operate under an age constraint. In such systems, the maximum time from the start of process L i in cycle k to the end in cycle k+1 must not exceed the age constraint A i for that process. Multiprocessors provide a scalable and cost-effective way of meeting the performance demands of such systems. The age constraint can ...

1999
Iain Bate Alan Burns

The purpose of this paper is to investigate the issues related to task attribute assignment on an individual processor. The majority of papers on fixed priority scheduling make the assumption that tasks have their attributes (deadline, period, offset and priority) pre-assigned. This makes priority assignment trivial. However in practice, the system’s timing requirements are specified and it is ...

2017
Christy C. Chong Helen Tam-Tham Brenda R. Hemmelgarn Robert G. Weaver Nairne Scott-Douglas Marcello Tonelli Robert R. Quinn Liam Manns Braden J. Manns

BACKGROUND Based on clinical practice guidelines, specific quality indicators are examined to assess the performance of a health care system for patients with end-stage renal disease (ESRD). We examined trends in the proportion of patients with ESRD referred late to nephrology, timing of dialysis initiation in those with chronic kidney disease, and proportion of patients with ESRD treated with ...

M. Abadi, S. Jalili,

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید