نتایج جستجو برای: evident
تعداد نتایج: 63677 فیلتر نتایج به سال:
The results of codependency analysis 9 qualitative and 4 quantitative measures plant communities homotoneity with statuses their naturalness based on the application indicator value scale hemeroby tolerance South Siberian plants are presented. highest correlation level was performed by multiplace measure similarity Jaccard.
“All metabolic measures followed linear trends in the group of non-diabetics except for insulin secretion that did not change during follow-up,” Tabak et al report in their abstract. Among diabetics, fasting glucose was accompanied by “...a steep quadratic increase.” Fasting glucose levels averaged 5.79 mmol/L at baseline and increased to 7.40 mmol/L “...starting three years before a diagnosis ...
We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the property that it is very difficult for any adversary to censor or modify the content. In addition, the identity of the publisher is protected once the content is posted. Our system differs from others in that we provide tools for updating or deleting the published content,...
An accurate description of changes in the brain in healthy aging is needed to understand the basis of age-related changes in cognitive function. Cross-sectional magnetic resonance imaging (MRI) studies suggest thinning of the cerebral cortex, volumetric reductions of most subcortical structures, and ventricular expansion. However, there is a paucity of detailed longitudinal studies to support t...
Recent industrial efforts in architectural and system support for trusted computing still leave systems wide-open even to relatively simple and inexpensive hardware-based attacks. These attacks attempt to snoop or modify data transfer between various chips in a computer system such as between the processor and memory, and between processors in a multiprocessor interconnect network. Software sec...
Secure software systems ultimately rely on the assumption that microprocessors are trustworthy. By modifying lines of Verilog code, a malicious designer could inject a hardware backdoor, subverting all security software and compromising confidentiality, integrity, or availability of a system. In security and safety critical systems, such as military and airline systems, this is an unacceptable ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید