نتایج جستجو برای: molecular certificates
تعداد نتایج: 641525 فیلتر نتایج به سال:
Several signal recovery tasks can be relaxed into semidefinite programs with rank-one minimizers. A common technique for proving these programs succeed is to construct a dual certificate. Unfortunately, dual certificates may not exist under some formulations of semidefinite programs. In order to put problems into a form where dual certificate arguments are possible, it is important to develop c...
BACKGROUND In the period 2004-2009, national and regional initiatives were developed in Sweden to improve the quality of sickness certificates. Parameters for assessing the quality of sickness certificates in primary health care have been proposed. The aim of this study was to measure the quality of sickness certification in primary health care by means of assessing sickness certificates issued...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that these services require builds upon TLS/SSL. Unfortunately, TLS/SSL is highly vulnerable to compromised Certificate Authorities (CAs) and the certificates they generate. Certificate Transparency (CT) provides a way to monitor and audit certificates and certificate chains, to help improve the overal...
background: different measures of mortality and morbidity statistics is a good tool in determining the health status of a community،the health network development and application of methods of prevention and treatment. basis of mortality data is the death certificate and the most important index in death certificate is accuracy of death causes with who standards and death causes codes in icd10....
Nested certificates are used to certify their subject certificates. In this way, the subject certificates can be verified via their nested certificates without using signature verification methods based on public key cryptosystems. Such a verification method is called as subject certificate verification. In this paper, subject certificate verification method will be introduced. It will be shown...
The SSL/TLS protocol suite constitutes the key building block of today’s Internet security, providing encryption and authentication for end-to-end communication with its underlying X.509 certificate infrastructure. However, the system remains brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. Several recent high-pr...
A new approach to the deployment of public key infrastructure is presented, based on a separation between the issuing of certificates and the usage of certificates. Certificates are signed assertions by the issuer about the subject of the certificate (holder of corresponding secret key), not necessarily identifying the subject. Typical use of certificate is for access control decisions, to dete...
Many problems in interprocedural program analysis can be modeled as the context-free language (CFL) reachability problem on graphs and solved cubic time. Despite years of efforts, there are no known truly sub-cubic algorithms for this problem. We study related certification task: given an instance CFL reachability, small efficiently checkable certificates existence non-existence a path? show th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید