نتایج جستجو برای: protected

تعداد نتایج: 55122  

2003
J Hanks A M Attwell

Protected Areas (PAs) are fundamental for biodiversity conservation, for the provision of ecosystem services, and for tourism. In Africa, they are subject to increasing pressures of two kinds: objective factors, like high human fertility rates, that are generally not open to human manipulation, and subjective factors that are under human control. A major subjective component has been reduction ...

2002
Marc Joye Karine Villegas

Side-channel analysis is a powerful tool for retrieving secrets embedded in cryptographic devices such as smart cards. Although several practical solutions have been proposed to prevent the leakage of sensitive data, mainly the protection of the basic cryptographic operation itself has been thoroughly investigated. For example, for exponentiation-based cryptosystems (including RSA, DH or DSA), ...

Journal: :South African medical journal = Suid-Afrikaanse tydskrif vir geneeskunde 2005
Chris Bateman

IZINDABA 218 Dispensing doctors breathed a sigh of relief on 11 March when the government's dogged legal insistence that they not dispense medicine within 5 km of any pharmacy was overruled on appeal to the Constitutional Court. The victory is all the more significant in that doctors setting up practices in future will also not be affected by the provision which the court declared null and void...

2010
Yuval Peress Ian Finlayson Gary Tyson David Whalley

Additional on-chip transistors as well as more aggressive processors have led the way for an ever expanding memory hierarchy. Multi-core architectures often employ the use of a shared L3 cache to reduce accesses to off chip memory. Such memory structures often incur long latency (as much as 30 cycles in our framework) and are configured to retain sets as large as 16 way. A baseline replacement ...

2003
Runa Jesmin

To provide facilities for filtering pornographic material and to research children’s safety on the Internet.

2006
Trent Jaeger

We revisit the notion of achieving a protected communication path for applications connected via the Internet using SELinux. Last year, we discussed the mechanism for integrating IPsec with SELinux security labels, but we did not consider the system goals for using such labels. Toward this end, we revisit early SELinux proposals for what is called a protected path. A protected path is a secure ...

Journal: :journal of crop protection 2015
farid allache yakouta bouta fatma demnati

the objective was to study the population development of tuta absoluta (meyrick, 1917) on tomato in greenhouse conditions at droh. the trial assessed the occurrence of t. absoluta adults from the month of october to may in traps; a low numbers is noted. the high numbers recorded (170 adults/greenhouse) are caught at the end of crop cycle. the mean number of capture is 22 adults/ week/ trap. reg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید