نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

1991

A 'mole' at the Bristol Royal Infirmary tells me that at the last Hospital Committee Meeting it was explained to the assembled consultants that under the rules of the new Special Trust, when they have fulfilled the Provider contract for the number of patients to be seen in a particular week, they will not be allowed to see any more.

Social responsibility of pastoralists is one of the most important elements and an integral part of rangelands exploitation. It not only leads to better rangeland health, but also enhances exploiters’ satisfaction for continuous sustainable utilization of rangelands. The present study investigated the role of social responsibility in rangelands condition in nomadic areas of Gonbad County in Gol...

Journal: :Ecology 2012
José M Fedriani Magdalena Zywiec Miguel Delibes

The persistence of mutualisms despite the strong incidence of exploiters could be explained if exploiters deny one or more services (i.e., cheat) while eventually supplying some subtler but critical services. Pulp feeders usually ingest fruit reward without dispersing seeds and thus are considered to be mainly cheaters or thieves of seed-disperser mutualisms. By consuming the fruit pulp, howeve...

Journal: :Mathematical biosciences 2006
Joe Yuichiro Wakano

We consider the population dynamics of two competing species sharing the same resource, which is modeled by the carrying capacity term of logistic equation. One species (farmer) increases the carrying capacity in exchange for a decreased survival rate, while the other species (exploiter) does not. As the carrying capacity is shared by both species, farmer is altruistic. The effect of continuous...

Journal: :American Journal of Ophthalmology 1922

2017
Emre Uzun Gennaro Parlato Vijayalakshmi Atluri Anna Lisa Ferrara Jaideep Vaidya Shamik Sural David Lorenzi

Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...

خسروی شادمانی, فاطمه, زایری, فرید, سوری, حمید, مهماندار, محمد رضا, کرمی, منوچهر,

Background & Objectives: In the chain of vehicles, human and environment, the human factors are the most complex element in the causes of road traffic injuries (RTIs). Unauthorized speeding and overtaking are considered as the main human factors resulting RTIs. This study estimated the population attributablefraction of two human factors, the most common risk factors of rural roads, of RTIs. Me...

Journal: :Philosophical transactions of the Royal Society of London. Series B, Biological sciences 2007
Noél M A Holmgren Niclas Norrström Wayne M Getz

Sympatric speciation can arise as a result of disruptive selection with assortative mating as a pleiotropic by-product. Studies on host choice, employing artificial neural networks as models for the host recognition system in exploiters, illustrate how disruptive selection on host choice coupled with assortative mating can arise as a consequence of selection for specialization. Our studies demo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید