نتایج جستجو برای: intensity running forced could prevent memory corruption

تعداد نتایج: 1469556  

2015
Edson da Silva Bárbara Lúcia Santos Soares Larissa Silveira Ferreira Cynthia Fernandes Ferreira Santos

Materials and methods Ninety-day-old female Wistar rats were divided into three groups: exercised-control (EC; n=5), high intensity exercised-diabetic (HIED=high intensity training, 80% of the maximum speed in the stress test; n=4) and low intensity exercised-diabetic (LIED=low Intensity training, 40% of the maximum speed in the stress test; n=6). The diabetes was induced in the rats by adminis...

2016
Kazumasa Miyatake Takeshi Muneta Miyoko Ojima Jun Yamada Yu Matsukura Kahaer Abula Ichiro Sekiya Kunikazu Tsuji

BACKGROUND Although osteoarthritis (OA) is a multifactorial disease, little has been reported regarding the cooperative interaction among these factors on cartilage metabolism. Here we examined the synergistic effect of ovariectomy (OVX) and excessive mechanical stress (forced running) on articular cartilage homeostasis in a mouse model resembling a human postmenopausal condition. METHODS Mic...

2017
Patrick Hulin Andy Davis Rahul Sridhar Andrew Fasano Cody Gallagher Aaron Sedlacek Tim Leek Brendan Dolan-Gavitt

Capture the Flag (CTF) is a popular computer security exercise in which teams competitively attack and/or defend programs in real time. CTFs are currently expensive to build and run; each is a bespoke affair, with challenges and vulnerabilities crafted by experts. This not only limits the educational value for players but also restricts what researchers can learn about human activities during t...

2016
Xunchao Hu Aravind Prakash Jinghan Wang Rundong Zhou Yao Cheng Heng Yin

JavaScript exploits impose a severe threat to computer security. Once a zero-day exploit is captured, it is critical to quickly pinpoint the JavaScript statements that uniquely characterize the exploit and the payload location in the exploit. However, the current diagnosis techniques are inadequate because they approach the problem either from a JavaScript perspective and fail to account for “i...

2002
Ajoy Kumar Datta Maria Gradinariu Potop-Butucaru Anthony B. Kenitzki Sébastien Tixeuil

Wormhole routing is most commonly used in parallel architectures in which messages are sent in small fragments, called flits. It is a lightweight and efficient method of routing messages between parallel processors. Self-stabilization is a technique that guarantees tolerance to transient faults (e.g., memory corruption or communication hazards) for a given protocol. Self-stabilization guarantee...

2016
Nick Stephens John Grosen Christopher Salls Andrew Dutcher Ruoyu Wang Jacopo Corbetta Yan Shoshitaishvili Christopher Krügel Giovanni Vigna

Memory corruption vulnerabilities are an everpresent risk in software, which attackers can exploit to obtain unauthorized access to confidential information. As products with access to sensitive data are becoming more prevalent, the number of potentially exploitable systems is also increasing, resulting in a greater need for automated software vetting tools. DARPA recently funded a competition,...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1390

abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...

Journal: :The Journal of nervous and mental disease 2005
Steffen Moritz Todd S Woodward Jennifer C Whitman Carrie Cuttler

In two previous studies, it was observed that schizophrenic patients display increased confidence in memory errors compared with controls. The patient group displayed an increased proportion of errors in their knowledge system, quantified as the percentage of high-confident responses that are errors. The latter phenomenon has been termed knowledge corruption and is put forward as a risk factor ...

2013
Germán Moltó Miguel Caballer Eloy Romero Carlos de Alfonso

This paper addresses the impact of vertical elasticity for applications with dynamic memory requirements when running on a virtualized environment. Vertical elasticity is the ability to scale up and scale down the capabilities of a Virtual Machine (VM). In particular, we focus on dynamic memory management to automatically fit at runtime the underlying computing infrastructure to the application...

Journal: :International journal of social science and human research 2021

Corruption has been widespread, it is increasingly systematic, inducing losses to the national economy. Article 2 paragraph (2) of Law Number 31 1999 concerning Eradication Criminal Acts Corruption, death penalty can be imposed under certain conditions, but so far there no corruptor sentenced death. This study discussed issues related with corruption, including: first, how urgency applied corru...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید