نتایج جستجو برای: evident

تعداد نتایج: 63677  

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

Journal: :European Journal of Vascular and Endovascular Surgery 2019

Journal: :BIO web of conferences 2021

The results of codependency analysis 9 qualitative and 4 quantitative measures plant communities homotoneity with statuses their naturalness based on the application indicator value scale hemeroby tolerance South Siberian plants are presented. highest correlation level was performed by multiplace measure similarity Jaccard.

2009

“All metabolic measures followed linear trends in the group of non-diabetics except for insulin secretion that did not change during follow-up,” Tabak et al report in their abstract. Among diabetics, fasting glucose was accompanied by “...a steep quadratic increase.” Fasting glucose levels averaged 5.79 mmol/L at baseline and increased to 7.40 mmol/L “...starting three years before a diagnosis ...

2000
Marc Waldman Aviel D. Rubin Lorrie Faith Cranor

We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the property that it is very difficult for any adversary to censor or modify the content. In addition, the identity of the publisher is protected once the content is posted. Our system differs from others in that we provide tools for updating or deleting the published content,...

Journal: :The Journal of neuroscience : the official journal of the Society for Neuroscience 2009
Anders M Fjell Kristine B Walhovd Christine Fennema-Notestine Linda K McEvoy Donald J Hagler Dominic Holland James B Brewer Anders M Dale

An accurate description of changes in the brain in healthy aging is needed to understand the basis of age-related changes in cognitive function. Cross-sectional magnetic resonance imaging (MRI) studies suggest thinning of the cerebral cortex, volumetric reductions of most subcortical structures, and ventricular expansion. However, there is a paucity of detailed longitudinal studies to support t...

2007
Yan Solihin

Recent industrial efforts in architectural and system support for trusted computing still leave systems wide-open even to relatively simple and inexpensive hardware-based attacks. These attacks attempt to snoop or modify data transfer between various chips in a computer system such as between the processor and memory, and between processors in a multiprocessor interconnect network. Software sec...

2010
Robbie Hott Aleksander Morgan Benjamin Rodes

Secure software systems ultimately rely on the assumption that microprocessors are trustworthy. By modifying lines of Verilog code, a malicious designer could inject a hardware backdoor, subverting all security software and compromising confidentiality, integrity, or availability of a system. In security and safety critical systems, such as military and airline systems, this is an unacceptable ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید