نتایج جستجو برای: before digging
تعداد نتایج: 478147 فیلتر نتایج به سال:
Taking as its starting-point the interest in archaeological metaphors evinced by Freud and Jung, this paper considers project of analytical psychology under rubric recently discussed term, ‘philosophical archaeology’. Noting shared methodological assumptions procedures between these two areas, goes on to examine extent which Jung’s can legitimately be considered an pursuit respect key aspects: ...
Methods for investigating outbreaks of hepatitis C virus (HCV) have evolved since the discovery of the virus in 1989. Early investigations focused on epidemiological evidence such as likelihood of exposure, risk factors, temporal information, and serological evidence to identify members of an outbreak [1–3]. Streamlined nucleic acid sequencing methods provided an important means of verifying su...
In this paper we investigate non-dominant collective urban mobility patterns in user-generated mobile network traffic data using a visual analytics tool. Based on our previous approach and results, we herein focus on the next level of mobility detail: we visually dig deeper and disclose some nondominant, potentially hidden mobility patterns in four urban test areas in Northern Italy. The result...
Improvement of the work efficiency is demanded by aging and reducing of the working population in the construction field, so that some automation technologies are applied to construction equipment, such as bulldozers and excavators. However, not only the automation technologies but also expert skills are necessary to improve the work efficiency. In this paper, the human skill evaluation is prop...
Nuclear receptors (NRs) are hormone-sensing transcription factors that translate dietary or endocrine signals into changes in gene expression. Therefore, the adoption of orphan NRs through the identification of their endogenous ligands is a key element for our understanding of their biology. In this minireview, we give an update on recent progress in regard to endogenous ligands for a cluster o...
Characterizing peer-to-peer overlays is crucial for understanding their impact on service provider networks and assessing their performance. Most popular file exchange applications use distributed hash tables (DHTs) as a framework for managing information. Their fully decentralized nature makes monitoring and users tracking challenging. In this work, we analyze KAD, a widely deployed DHT system...
One of the gaping holes in the public health tool kit is the lack of comprehensive knowledge about the occurrence and toxic effects of the full spectrum of chemicals emitted by industrial facilities. The Commission for Environmental Cooperation (CEC) has taken a small step toward filling this void by assembling selected basic toxics data for North America with the 10 June 2009 release of its 12...
Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework perfectly, by understanding them in this way...
Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework perfectly, by understanding them in this way...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید