نتایج جستجو برای: oil digging

تعداد نتایج: 140437  

2008
Marcin Pietrzyk Guillaume Urvoy-Keller Jean-Laurent Costeux

Characterizing peer-to-peer overlays is crucial for understanding their impact on service provider networks and assessing their performance. Most popular file exchange applications use distributed hash tables (DHTs) as a framework for managing information. Their fully decentralized nature makes monitoring and users tracking challenging. In this work, we analyze KAD, a widely deployed DHT system...

2009
Angela Spivey

One of the gaping holes in the public health tool kit is the lack of comprehensive knowledge about the occurrence and toxic effects of the full spectrum of chemicals emitted by industrial facilities. The Commission for Environmental Cooperation (CEC) has taken a small step toward filling this void by assembling selected basic toxics data for North America with the 10 June 2009 release of its 12...

2002

Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework perfectly, by understanding them in this way...

2002
Florian P. Buchholz Thomas E. Daniels James P. Early Rajeev Gopalakrishna R. Patrick Gorman Benjamin A. Kuperman Sofie Nystrom Addam Schroll Andrew Smith

Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework perfectly, by understanding them in this way...

Journal: :Journal of Infectious Diseases 2015

2008
Stéphane Marchand-Maillet

User interaction may take many forms in multimedia systems. Current systems mainly waste this implicit and natural source of semantic knowledge and rather create tedious and unnatural interaction protocols. We advocate for a complete integration of natural interaction protocols and semantic knowledge capture, mainly thru mining interaction sessions. We assert that users possess the ability to q...

2015
K Mazhar I Cliff N Watson CMR Satur

Background/Introduction Pectus Excavatum is the most common congenital chest wall deformity (90%) and the documented incidence ranges between 0.1% 0.3%. Patients with Pectus Excavatum can suffer with body image and psychological issues. Indications for surgical correction remains controversial although a decrease in exercise tolerance is frequently overlooked. A general consensus persists that ...

2013
Ayuko Meguro Takeo Tomita Makoto Nishiyama Tomohisa Kuzuyama

Digging up skeletons: We report the identification and the functional characterization of two terpene cyclases (DtcycA and DtcycB) that were mined from the genome of Streptomyces sp. SANK 60404. DtcycA and DtcycB are novel bacterial diterpene cyclases for the synthesis of the cembrane skeleton.

Journal: :Journal of Statistical Mechanics: Theory and Experiment 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید