نتایج جستجو برای: attacks

تعداد نتایج: 57358  

2005
Baptiste Jeudy François Rioult

L’une des activités les plus importantes en biologie est l’analyse des données d’expression de gènes. Les biologistes espèrent ainsi mieux comprendre les fonctions des gènes et leurs interactions. Nous étudions dans cet article une technique permettant d’aider à l’analyse de ces données d’expression : l’extraction de concepts sous contraintes. Pour cela, nous proposons d’extraire des fermés sou...

2014
De-wen Wang Yao Liu Ming-min Jiang

Terrorism is a global issue and a constant international threat. As a result, anti-terrorism and emergency response strategies are tasks of critical importance that have a direct impact on the national security of every country in the world. This paper reviews new characteristics of international anti-terrorism measures and offers an in-depth reflection on emergency medical response countermeas...

2006
Hakim Hacid Djamel A. Zighed

Résumé. La découverte d’informations cachées dans les bases de données multimédias est une tâche difficile à cause de leur structure complexe et à la subjectivité liée à leur interprétation. Face à cette situation, l’utilisation d’un index est primordiale. Un index multimédia permet de regrouper les données selon des critères de similarité. Nous proposons dans cet article d’apporter une amélior...

Journal: :Journal of anxiety disorders 2014
Christiane A Pané-Farré Jan P Stender Kristin Fenske Jürgen Deckert Andreas Reif Ulrich John Carsten Oliver Schmidt Andrea Schulz Thomas Lang Georg W Alpers Tilo Kircher Anna N Vossbeck-Elsebusch Hans J Grabe Alfons O Hamm

The purpose of the study was to contrast first panic attacks (PAs) of patients with panic disorder (PD) with vs. without agoraphobia and to explore differences between first PAs leading to the development of PD and those that remain isolated. Data were drawn from a community survey (N=2259 including 88 isolated PAs and 75 PD cases). An additional sample of 234 PD patients was recruited in a cli...

Journal: :Expert review of neurotherapeutics 2011
Marina Machado Vilarim Daniele Marano Rocha Araujo Antonio Egidio Nardi

This systematic review aimed to examine the results of studies that have investigated the induction of panic attacks and/or the anxiogenic effect of the caffeine challenge test in patients with panic disorder. The literature search was performed in PubMed, Biblioteca Virtual em Saúde and the ISI Web of Knowledge. The words used for the search were caffeine, caffeine challenge test, panic disord...

1987
Randolph M. Nesse R. M. Nesse

Panic, when viewed ethologically, is not pathological in itself, it is rather an adaptation that evolved to facilitate escape in dangerous situations. Patients with panic disorder have panic with normal form, but the attacks occur in the absence of real danger. The agoraphobia syndrome can be understood as a related adaptation that is expected after repeated panic attacks. These hypotheses acco...

Journal: :The Journal of the American Board of Family Practice 2002
Anjum Bashir Conrad Swartz

The Food and Drug Administration indication of alprazolam for the treatment of panic disorder tacitly suggests that it does not induce panic attacks. This suggestion is amplified by the history of alprazolam as the first medication approved for panic disorder. Moreover, alprazolam acutely decreases anxiety symptoms, including panic, and is widely used for this indication. Although dependence, w...

2012
Yannick Le Bras Patrick Meyer Philippe Lenca Stéphane Lallich

Résumé. Nous proposons dans cet article une définition formelle de la robustesse pour les règles d’association, s’appuyant sur une modélisation que nous avons précédemment définie. Ce concept est à notre avis central dans l’évaluation des règles et n’a à ce jour été que très peu étudié de façon satisfaisante. Il est crucial car malgré une très bonne évaluation par une mesure de qualité, une règ...

Journal: :Journal of Cryptographic Engineering 2021

Abstract Montgomery’s and Barrett’s modular multiplication algorithms are widely used in exponentiation algorithms, e.g. to compute RSA or ECC operations. While algorithm has been studied extensively the literature many side-channel attacks have detected, our best knowledge no thorough analysis exists for algorithm. This article closes this gap. For both algorithm, differences of execution time...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید