نتایج جستجو برای: friendly

تعداد نتایج: 42772  

2001
Shudong Jin Liang Guo Ibrahim Matta Azer Bestavros

Journal: :The Journal of Experimental Medicine 2008
Hema Bashyam

On page 1343, Shimomura et al. identify a group of B cells that rebels against convention: unlike other B cells, this group matures in the gut and might protect it from inflammatory damage. B cells are thought to mature in the bone marrow and spleen. As they mature, B cells express the immunoglobulin receptor IgM, which distinguishes them from their antigen-activated brethren. The activated cel...

2012
Orna Kupferman Sigal Weiner

Of special interest in verification are safety properties, which assert that the system always stays within some allowed region. For closed systems, the theoretical properties of safety properties as well as their practical advantages with respect to general properties are well understood. For open (a.k.a. reactive) systems, whose behavior depends on their on-going interaction with the environm...

2006
MARK HINGSTON Mark van Setten

Recommender systems are a recent but increasingly widely used resource. Yet most, if not all of them suffer from serious deficiencies. Recommender systems often require first time users to enter ratings for a large number of items — a tedious process that often deters users. Thus, this thesis investigated whether useful recommendations could be made without requiring users to explicitly rate it...

2005
Yuting Zhang Azer Bestavros Mina Guirguis Ibrahim Matta Richard West

With the increased use of “Virtual Machines” (VMs) as vehicles that isolate applications running on the same host, it is necessary to devise techniques that enable multiple VMs to share underlying resources both fairly and efficiently. To that end, one common approach is to deploy complex resource management techniques in the hosting infrastructure. Alternately, in this paper, we advocate the u...

2015
Ellen Trolle Lisbeth Mogensen Michael Søgaard Jørgensen Anne Vibeke Thorsen

The aim of this study was to investigate how the present Danish diet could be changed in a climate friendly direction that follows the recommendations of a healthy diet. The carbon footprint (CF) of an average Danish diet was calculated and compared to CF of a recommended healthy diet by 1) modifying the average diet according to the Danish food based dietary guidelines, 2) and adjusting to ens...

2000
Naoki Wakamiya Masayuki Murata Hideo Miyahara

When both TCP and UDP connections co-exist in the Internet environment, the performance of TCP connections is heavily affected by the behavior of “greedy” UDP connections of real-time multimedia applications. In this paper, we propose a new TCP-friendly rate control protocol for video connections, called MPEG-TFRCP, to fairly share the link with TCP connections. To achieve fairness among TCP an...

2016
Jordan Martel

In the United States, customer owned firms are responsible for 35% of consumer insurance and 10% of consumer banking, yet receive little theoretical or empirical attention. In this paper, I propose a theory of internal finance for the customer owned firm. I show that its growth, pricing, and capital structure are tied together: higher sales tomorrow are achieved through higher prices today and ...

Journal: :Environmental Health Perspectives 1994
M. J. EMBLETON

-Monoclonal antibody against an osteogenic-sarcoma cell line (791T) was prepared by production and cloning of a somatic-cell hybrid between the mouse myeloma P3-NS1 and spleen cells from 791T-immunized mice. Three clones of a hybridoma producing antibody against 791T, as detected by 1251-labelled Protein A binding, were tested against a range of normal and tumour cell targets to determine the p...

2007
Stefan Schiffner Markulf Kohlweiss

We analyze the Sybil proof and privacy properties of SybilGuard [YKGF06]. Sybilguard is a decentralized protocol that operates in a friendship graph type (overlay) network. The protocol prevents an attacker that is limited in its friendship relations from controlling arbitrarily many network nodes. We present a Sybil attack on SybilGuard that exploits the protocol’s network update functionality...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید