نتایج جستجو برای: covert repair hypothesis
تعداد نتایج: 355225 فیلتر نتایج به سال:
abstract background: different methods of surgical treatment for acromioclavicular(ac) joint injury were considered in the literature. the purpose of the study was to compare intra- articular ac repair technique with the extra-articular coracoclavicular repair technique for the patients with rockwood type iii and vac joint injury when indicated. methods: nineteen consecutive patients with r...
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. Detecting and preventing covert channels is particularly important for multilevel security systems in which processes working with classified information may leak information to processes with a lower classification leve...
The pupillary light reflex (PLR) was used to track covert shifts of attention to items maintained in visual working memory (VWM). In three experiments, participants performed a change detection task in which rectangles appeared on either side of fixation and at test participants indicated if the cued rectangle changed its orientation. Prior to presentation or during the delay, participants were...
It has become commonplace in semantic theorizing to argue that the semantic representation of certain linguistic expressions contains covert elements in addition to what is contributed by the overt linguistic material. Theorists have pursued this strategy with respect to a wide range of constructions in a wide range of languages. A small sample of such expression types in English would include ...
To improve understanding about genetic and environmental influences on antisocial behavior (ASB), we tested the association of the 44-base pair polymorphism of the serotonin transporter gene (5-HTTLPR) and maltreatment using latent class analysis in 2,488 boys and girls from Wave 1 of the National Longitudinal Study of Adolescent Health. In boys, ASB was defined by three classes (Exclusive Cove...
The present study investigates the challenges translators may face when translating pun expressions in some selections found Arabic poetry into English. examines strategies employed to translate puns, choice of pun’s sense, and perseverance aesthetic function puns analyses translation a sample ten Arabic-English by twenty-five MA students grounded on Delabastita’s (1993) model, graded salience ...
The psychological literature to date has identified more than one form of narcissism: the more well-known grandiose form, and the less familiar and recognized covert form. Although the distinction between these two narcissistic types has been identified with regard to better conceptualizing client dynamics, there has been much less written about how covert narcissistic tendencies and traits may...
Von Ahn, Hopper, and Langford [vAHL05] introduced the notion of two-party steganographic a.k.a. covert computation, which assures that neither party can distinguish its counterparty from a random noise generator, except for what is revealed by the final output of the securely computed function. The flagship motivation for covert computation is covert authentication, where two parties want to au...
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intr...
Whenever we open our eyes, we are confronted with an overwhelming amount of visual information. Covert attention allows us to select visual information at a cued location, without eye movements, and to grant such information priority in processing. Covert attention can be voluntarily allocated, to a given location according to goals, or involuntarily allocated, in a reflexive manner, to a cue t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید