نتایج جستجو برای: cross protection
تعداد نتایج: 662621 فیلتر نتایج به سال:
This paper, based on the Brockman and Chung (2003) framework, tests the hypothesis that H-shares registered under Chinese law (with lower level of investor protection and legal enforcement) are associated with higher levels of opportunistic earnings management than local shares registered under Hong Kong law, which are traded on the same Hong Kong equity market. The results using a sample of 85...
Mice were vaccinated with six strains of Salmonella and two strains of Escherichia coli, as well as with Pseudomonas aeruginosa, Proteus vulgaris, and Serratia marcescens. The amount of in vivo growth of each organism was followed by viable counting techniques on organ homogenates. The vaccinated mice, along with unvaccinated controls, were challenged intravenously with 1,000 ld(50) of a strept...
Based upon the lipopolysaccharide (LPS) structure and antigenicity of Shigella group B, a strategy for broad cross-protection against 14 Shigella flexneri serotypes was designed. This strategy involves the use of two S. flexneri serotypes (2a and 3a), which together bear the all of the major antigenic group factors of this group. The novel attenuated strains used in these studies were S. flexne...
To protect sensitive information in a cross tabulated table, it is a common practice to suppress some of the cells in the table. An analytic invariant is a power series in terms of the suppressed cells that has a unique feasible value and a convergence radius equal to +∞. Intuitively, the information contained in an invariant is not protected even though the values of the suppressed cells are n...
With the rapid growth of the mobile market, security of mobile platforms is receiving increasing attention from both research community as well as the public. In this paper, we make the first attempt to establish a baseline for security comparison between the two most popular mobile platforms. We investigate applications that run on both Android and iOS and examine the difference in the usage o...
Bordetella holmesii, a species closely related to B. pertussis, has been reported sporadically as a cause of whooping cough-like symptoms. To investigate whether B. pertussis-induced immunity is protective against infection with B. holmesii, we conducted an analysis using 11 human respiratory B. holmesii isolates collected during 2005-2009 from a highly B. pertussis-vaccinated population in Mas...
The current generation of client-side Cross-Site Scripting filters rely on string comparison to detect request values that are reflected in the corresponding response’s HTML. This coarse approximation of occurring data flows is incapable of reliably stopping attacks which leverage nontrivial injection contexts. To demonstrate this, we conduct a thorough analysis of the current state-of-the-art ...
An attenuated Plasmodium falciparum sporozoite (PfSPZ) vaccine is under development, in part, based on studies in mice with P. berghei. We used P. berghei and P. yoelii to study vaccine-induced protection against challenge with a species of parasite different from the immunizing parasite in BALB/c mice. One-hundred percent of mice were protected against homologous challenge. Seventy-nine percen...
Web applications are becoming the dominant way to provide access to online services. At the same time, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is embedded into web pages to support dynamic client-side behavior. This script code is executed in the context of the user’s web browser. To protect ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید