نتایج جستجو برای: dos resistance
تعداد نتایج: 501953 فیلتر نتایج به سال:
The pleckstrin homology (PH) domain-containing protein Daughter of Sevenless (DOS) is an essential component of the Sevenless receptor tyrosine kinase (SEV) signaling cascade, which specifies R7 photoreceptor development in the Drosophila eye. Previous results have suggested that DOS becomes tyrosine phosphorylated during SEV signaling and collaborates with the protein tyrosine phosphatase CSW....
Maintaining genomic integrity during DNA replication is essential for stem cells. DNA replication origins are licensed by the MCM2-7 complexes, with most of them remaining dormant. Dormant origins (DOs) rescue replication fork stalling in S phase and ensure genome integrity. However, it is not known whether DOs exist and play important roles in any stem cell type. Here, we show that embryonic s...
O objetivo princzpal deste artigo e" fer com que todos, sejam os acade^micos ou Os empresa rios ou aLnda os consumz.dores, compreendam o cena"rz-o atual e possam ter, pelo menos, uma percep50 minx'ma dos rumos qu_e as empresas, as tecnoLogz"as e o mercado consumidor tonzara-o nos pr6xz"mos anos. Para aLcanor o obj~etino deste artigo, mostra-Se o resultado de um estudo onde e" avaliado como as e...
Study of Analytical On-line Pyrolysis of Oils from Macauba Fruit (Acrocomia sclerocarpa M) via GC/MS
Estudos pirolíticos dos óleos vegetais das partes (endocarpo mais mesocarpo e epicarpo) do fruto da Macauba (Acrocomia sclerocarpa M.) foram realizados sob atmosfera de hélio usando-se um pirolisador de filamento modelo Girdel 75 -Py -1, conectado diretamente a um CG/EM. Os experimentos foram realizados em diferentes temperaturas e tempos de pirólise, para avaliar como estes parâmetros afetam o...
One of the most interesting aspects of amorphous semiconductor multilayers is their application in studying the interfaces between different a-Si:H based alloys, because of the great number of interfaces that a multilayer structure can contain. There are several magnitudes, such as the additional hydrogen content at interfaces [1,2] or the density of states (DOS) per interface [3-7] that can be...
This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and an attack phase. A DoS program must first be deployed on one or more compromised hosts before an attack is possible. Mitigation...
RESUMO: As helmintoses gastrintestinais constituem um dos principais fatores limitantes para a ovinocaprinocultura em todo o mundo e a saúde dos rebanhos depende de um efetivo controle antiparasitário. A resistência aos anti-helmínticos representa um dos entraves para esse controle e a busca por novas bases tem sido um desafio constante. A utilização da fitoterapia na medicina veterinária const...
In this paper we investigate denial of service (DoS) vulnerabilities in Voice over IP (VoIP) systems, focusing on the ITU-T H.323 family of protocols. We provide a simple characterisation of DoS attacks that allows us to readily identify DoS issues in H.323 protocols. We also discuss network layer DoS vulnerabilities that affect VoIP systems. A number of improvements and further research direct...
Although sulfur is an essential element for marine primary production and critical for climate processes, little is known about the oceanic pool of nonvolatile dissolved organic sulfur (DOS). We present a basin-scale distribution of solid-phase extractable DOS in the East Atlantic Ocean and the Atlantic sector of the Southern Ocean. Although molar DOS versus dissolved organic nitrogen (DON) rat...
Denial of Service (DOS) attacks are a major threat faced by all types of networks. The effect of DOS in a delay tolerant network (DTN) is even more aggravated due to the scarcity of resources. Perpetrators of DOS attacks in DTN-like environments look beyond the objective of rendering a target node useless. The aim of an attacker is to cause a network-wide degradation of resources, service and p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید