منابع مشابه
Anonymous sources: where do adult β cells come from?
Evidence that the pool of insulin-producing β cells in the pancreas is reduced in both major forms of diabetes mellitus has led to efforts to understand β cell turnover in the adult pancreas. Unfortunately, previous studies have reached opposing conclusions regarding the source of new β cells during regeneration in the adult pancreas. In this issue of the JCI, Xiao et al. use a novel mouse mode...
متن کاملA Semantic Language for Querying Anonymous Web Sources
A great deal of work has been carried out in recent years to facilitate access to data and information available on the Web. Proposals converge in two additional areas which consist in providing the sources with semantic annotations and in designing languages and tools that are capable of using these annotations. However, a large number of sources have not yet been annotated suitably. Besides, ...
متن کاملAnonymous Communication and Anonymous Cash
We propose considering the problem of electronic cash i n the context of a network in which anonymous, untraceable commiinicatlon is assumed to be possible. We present a formal model for such a network, and define security criteria for an electronic cash system in such a setting. Finally, we show that there exists a remarkably simple electrortic cash system which meets the security criteria of ...
متن کاملAttacks by “Anonymous” WikiLeaks Proponents not Anonymous
On November 28, 2010, the world started watching the whistle blower website WikiLeaks [1] to begin publishing part of the 250,000 US Embassy Diplomatic cables. These confidential cables provide an insight on U.S. international affairs from 274 different embassies, covering topics such as analysis of host countries and leaders and even requests for spying out United Nations leaders [2]. The rele...
متن کاملAnonymous Fingerprinting
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to identify the original buyer of a redistributed copy. Recently, asymmetric fingerprinting schemes were introduced. Here, only the buyer knows the fingerprinted copy after a sale, and if the merchant finds this copy somewhere, he obtains a proof that it was the copy of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Aesthetic Surgery Journal
سال: 2014
ISSN: 1090-820X,1527-330X
DOI: 10.1177/1090820x13514080