Endocardial Fibrosarcoma in a Reticulated Python (Python Reticularis)
نویسندگان
چکیده
منابع مشابه
Co-array Python: A Parallel Extension to the Python Language
A parallel extension to the Python language is introduced that is modeled after the Co-Array Fortran extensions to Fortran 95. A new Python module, CoArray, has been developed to provide co-array syntax that allows a Python programmer to address co-array data on a remote processor. An example of Jacobi iteration using the CoArray module is shown and corresponding performance results are presented.
متن کاملCardiovascular actions of python bradykinin and substance P in the anesthetized python, Python regius.
The cardiovascular actions of python bradykinin (BK) and substance P (SP) have been investigated in the anesthetized ball python, Python regius. Bolus intra-arterial injections of python BK (0.03-3 nmol/kg) produced concentration-dependent increases in arterial blood pressure, heart rate (HR), and cardiac output concomitant with small decreases in systemic resistance and stroke volume. Intra-ar...
متن کاملPyBox - A Python Sandbox
The application of dynamic malware analysis in order to automate the monitoring of malware behavior has become increasingly important. For this purpose, so-called sandboxes are used. They provide the functionality to execute malware in a secure, controlled environment and observe its activities during runtime. While a variety of sandbox software, such as the GFI Sandbox (formerly CWSandbox) or ...
متن کاملA Prolog Interpreter in Python
We provide a proof-of-concept for a new approach to flexible and portable implementation of programming languages. More precisely, we describe the implementation of a Prolog interpreter in RPython, a restricted subset of the Python language intended for system programming. RPython can be translated using the PyPy compilation and specialization tool-set to various platforms, among them C/Posix a...
متن کاملAmun: A Python Honeypot
In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the internet, named Amun. For this purpose, the software emulates a wide range of different vulnerabilities. As soon as an attacker exploits one of the emulated vulnerabilities the payload transmitted by the attacker is analyzed and any download URL found is extracted. Next, th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Veterinary Diagnostic Investigation
سال: 2010
ISSN: 1040-6387,1943-4936
DOI: 10.1177/104063871002200633