نتایج جستجو برای: surfer

تعداد نتایج: 493  

1999
Daniel V. Klein

Intrusions are often viewed as catastrophic events which destroy systems, wreak havoc on data through corruption or substitution, yield access to closely guarded sensitive information, or provide a springboard for hackers to attack other systems. Yet not all intrusions on the Web are the blatant, smash-and-grab, trash-the-site kind of attacks. Many attacks are more subtle, and some involve what...

Journal: :International Journal of Creative Computing 2013

Journal: :jundishapur journal of health sciences 0
farhad forouharmajd department of occupational health engineering, school of public health, isfahan university of medical sciences, isfahan, ir iran mitra shabab department of occupational health engineering, school of public health, isfahan university of medical sciences, isfahan, ir iran; department of occupational health engineering, school of health, ahvaz jundishapur university of medical sciences, ahvaz, ir iran; occupational health engineering department, school of health, ahvaz jundishapur university of medical sciences, ahvaz, ir iran. tel: +98-6133738269, fax: +98-33738282

conclusions according to the factory noise map, except for the control rooms with 81 dba noise, other cases of measuring stations were higher than the standard exposure of 85 dba noise. as a result, the implementation of control strategies, such as inspection and performance of control systems and insulation of the control room to prevent unnecessary exposure noise, are necessary. background st...

2008
František STANĚK Josef HONĚK

This paper deals with the methodology of modelling the Dubňany lignite seam base and its tectonic failure. Tectonic pattern of the Vienna Basin has been subject of many studies. Opinions on its origin have been developing. Coal seams in the South Moravian Lignite Coalfield were modelled under the project of the example modern evaluation of the coal deposit. Designed software with application of...

Journal: :Methods in molecular biology 2014
Yi Xiong Juan Esquivel-Rodriguez Lee Sael Daisuke Kihara

The increasing number of uncharacterized protein structures necessitates the development of computational approaches for function annotation using the protein tertiary structures. Protein structure database search is the basis of any structure-based functional elucidation of proteins. 3D-SURFER is a web platform for real-time protein surface comparison of a given protein structure against the e...

2003
Sreangsu Acharyya Joydeep Ghosh

Early approaches to mathematically abstracting websurfing behavior were largely based on first-order Markov models. Most humans however do not surf in a “memoryless” fashion, rather they are guided by their timedependent situational context and associated information needs. This belief is corroborated by the non-exponential revisit times observed in many site-centric weblogs. In this paper, we ...

Journal: :IJOCI 2011
Thomas Largillier Sylvain Peyronnet

Search engines use several criteria to rank webpages and choose which pages to display when answering a request. Those criteria can be separated into two notion, relevance and popularity. This notion of popularity is calculated by the search engine and is related to links made to the webpage. Malicious webmasters want to artificially increase their popularity, the techniques they use are often ...

2006
Dinh Nguyen Tran Wei Tsang Y. C. Tay

User reaction to traffic congestion can have severe impact on network stability and significant implication for traffic engineering. For example, users who persist in large peer-to-peer transfers despite congestion can drive the network into congestion collapse. On the other hand, users who abort large transfers can smoothen self-similar traffic. We present a tool, called SAX, for studying cong...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید