نتایج جستجو برای: covert repair hypothesis

تعداد نتایج: 355225  

2010
Thomas Nagel Daniel J. Kelly

Introduction A number of theories have been proposed that relate the differentiation pathway of mesenchymal stem cells (MSCs) to their biomechanical environment during healing. In addition, the organisation of the ECM determines the mechanical fitness of any repair tissue. A key structural component in most soft tissues is collagen. Our hypothesis is that both cell phenotype and the collagen or...

2009
Sarah H. Sellke Chih-Chun Wang Saurabh Bagchi Ness B. Shroff

Web traffic accounts for more than half of Internet traffic today. Camouflaging covert timing channels in Web traffic would be advantageous for concealment. In this paper, we investigate the possibility of disguising network covert timing channels as HTTP traffic to avoid detection. Extensive research has shown that Internet traffic, including HTTP traffic, exhibits self-similarity and long ran...

Journal: :The European journal of neuroscience 2010
Simon P Kelly John J Foxe Geoffrey Newman Jay A Edelman

When preparing to make a saccadic eye movement in a cued direction, perception of stimuli at the target location is enhanced, just as it is when attention is covertly deployed there. Accordingly, the timing and anatomical sources of preparatory brain activity accompanying shifts of covert attention and saccade preparation tend to exhibit a large degree of overlap. However, there is evidence tha...

2017
Yang Zhou Lixin Liang Yujun Pan Ning Qian Mingsha Zhang

The site of overt attention (fixation point) defines a spatial reference center that affects visuomotor response as indicated by the stimulus-response-compatibility (SRC) effect: When subjects press, e.g., a left key to report stimuli, their reaction time is shorter when stimuli appear to the left than to the right of the fixation. Covert attention to a peripheral site appears to define a simil...

2011
Jason Jaskolka Ridha Khedri Khair Eddin Sabri

With the emergence of computers in every day activities and with the ever-growing complexity of networks and network communication protocols, covert channels are becoming an eminent threat to the confidentiality of information. In light of this threat, we propose a technique to detect confidential information leakage via covert channels. Although several works examine covert channel detection a...

2015
Vincent Rose VINCENT ROSE

An analogue study was conducted to test the clinical efficacy of covert reinforcement (Cautela, 1970) and to assess the role of behavioral .rehearsal in covert reinforcement. A secondary purpose was to determine the effects of image clarity, subject anxiety level and rate of extra session imagery on the therapeutic effect of covert reinforcement. Forty introductory psychology students who score...

Journal: :The Journal of clinical investigation 2015
Masato Yuasa Nicholas A Mignemi Jeffry S Nyman Craig L Duvall Herbert S Schwartz Atsushi Okawa Toshitaka Yoshii Gourab Bhattacharjee Chenguang Zhao Jesse E Bible William T Obremskey Matthew J Flick Jay L Degen Joey V Barnett Justin M M Cates Jonathan G Schoenecker

Bone formation during fracture repair inevitably initiates within or around extravascular deposits of a fibrin-rich matrix. In addition to a central role in hemostasis, fibrin is thought to enhance bone repair by supporting inflammatory and mesenchymal progenitor egress into the zone of injury. However, given that a failure of efficient fibrin clearance can impede normal wound repair, the preci...

2015
Vladimir Kolesnikov Alex J. Malozemoff

The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency trade-off: a covert player may arbitrarily cheat, but is caught with a certain fixed probability. This permits more efficient protocols than the malicious setting while still giving meaningful security guarantees. However, one drawback is that cheating cannot be proven to a third party, which preven...

2015
James Brookes

Past literature has suggested a dual nature of trait based narcissism, comprising overt and covert forms. While several studies have examined the two subtypes in relation to self-esteem, very few studies have examined narcissistic subtypes and self-efficacy. 115 Psychology undergraduates filled in self-report measures of overt narcissism, covert narcissism, self-esteem and self-efficacy. Result...

Journal: :Cortex; a journal devoted to the study of the nervous system and behavior 2003
Stefan R Schweinberger A Mike Burton

In this viewpoint, we discuss the new evidence on covert face recognition in prosopagnosia presented by Bobes et al. (2003, this issue) and by Sperber and Spinnler (2003, this issue). Contrary to earlier hypotheses, both papers agree that covert and overt face recognition are based on the same mechanism. In line with this suggestion, an analysis of reported cases with prosopagnosia indicates th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید