Checkpoint for invasion

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Invasion of waves, invasion of thoughts

Abstract Nowadays, as accepted as the era of information or digital, time has changed and has invited all people to a new world in which everybody must define himself. Avoiding from getting benefit from this human progress is useless; Rather, we must know this great technology best and adapt ourselves with its consequences. In fact, in many countries and among many nations there had been peopl...

متن کامل

The Difference of Expression of 18 Genes in Axillary Invasion and Vascular Invasion Compared to Control Samples in Breast Cancer

Background & Objective: Recent studies from gene profiling have revealed some genes that are overexpressed in the epithelial-mesenchymal transition (EMT) process and are responsible for its initiation and activation resulting in tumor progression and metastasis. The present study aimed to assess the role of genes involved in the EMT process and the association of these genes wi...

متن کامل

Design Patterns for Checkpoint-Based Rollback Recovery

Checkpoint-based rollback recovery is a very popular category of fault tolerance techniques, which are based on a simple idea: save the system state during error-free portions of the system execution; when an error occurs, use the saved state to rollback the system to a recent consistent state. This way, after an error occurs the system does not have to start its execution from the beginning, w...

متن کامل

An Anti-Checkpoint Activity for Rif1

Chromosomal double-strand breaks (DSBs) are among the most severe lesions a cell has to deal with: if left unrepaired, they may lead to cell death or cancer. Thus, efficient mechanisms have evolved that respond to the presence of DSBs. These are collectively called the ‘‘DNA damage response’’ (DDR), or the ‘‘DNA damage checkpoint’’. As a result of intensive studies by many research groups in se...

متن کامل

Lazy Checkpoint Coordination for Bounding Rollback Propagation

shown that logging a nondeterministic event equivalently places a logical checkpoint [18] at the end of the ensuing In this paper, we propose the technique of lazy checkstate interval, and these extra logical checkpoints serve to point coordination which preserves process autonomy eliminate the domino effect. while employing communication-induced checkpoint coCoordinated checkpointing achieves ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 2000

ISSN: 0028-0836,1476-4687

DOI: 10.1038/35012728