نتایج جستجو برای: application program interface

تعداد نتایج: 1331322  

1994
Serge Fdida

This paper presents an application programming interface (API) for users to select and activate multime-dia services in a multivendor environment. This API hides the complexities and details of handling these complex services from the application developers. An abstract model has been deened that accommodates an extensive set of services involving communication and end-systems. The paper deenes...

2014
HAMID REZA RANJBAR MEHDI SADEGHZADEH AHMAD KESHAVARZ

Losses caused by malware are irrecoverable. Detection of malicious activity is the most challenge in the security of computing systems because current virulent executable are using sophisticated polymorphism and metamorphism techniques. It make difficult for analyzers to investigate their code statically. In this paper, we present a data mining approach to predict executable behavior. We provid...

2004
Anton Bogdanovych Helmut Berger Simeon Simoff Carles Sierra

In this paper we propose the use of Virtual Worlds as a 3D social interface for Electronic Institutions. It is shown how the two metaphors, Virtual Worlds and Electronic Institutions are combined into a single metaphor, 3D Electronic Institutions, while retaining the features and advantages of both. Its essence is to open Electronic Institutions to human users. The strong methodology and powerf...

Journal: :RFC 2008
Nicolas Williams Alexey Melnikov

Domain-based service names are similar to host-based service names, but using a domain name (not necessarily an Internet domain name) in addition to a hostname. The primary purpose of domain-based names is to provide a measure of protection to applications that utilize insecure service discovery protocols. This is achieved by providing a way to name clustered services after the "domain" which t...

2009
Sadia Afroz Rachel Greenstadt

Phishing is a web-based attack that uses social engineering techniques to exploit Internet users and acquire sensitive data. Most phishing attacks work by creating a fake version of the real site’s web interface to gain the user’s trust. Despite the fact that these phishing sites look identical or nearly identical to the real sites they imitate, user studies have shown that users ignore browser...

2016
Katherine Wiles Nawal Bahal Hilary Engward Andrew Papanikitas

An ethically problematic clinical case is used to illustrate the potential importance of understanding clinical ethics in an interdisciplinary context. Whilst much has been written on ethics education for multidisciplinary and interdisciplinary teams, we argue that it is important that both healthcare professions and healthcare teams are able to look outside their own disciplinary ethos and som...

Journal: :Bioinformation 2005
Velamoor Rajagopal Ramaswamy Manimekalai Krishnamurthy Devakumar Rajesh Anitha Karun Vittal Niral Murali Gopal Shamina Aziz Marimuthu Gunasekaran Mundappurathe Ramesh Kumar Arumugam Chandrasekar

UNLABELLED Coconut crop improvement requires a number of biotechnology and bioinformatics tools. A database containing information on CG (coconut germplasm), CCI (coconut cultivar identification), CD (coconut disease), MIFSPC (microbial information systems in plantation crops) and VO (vegetable oils) is described. The database was developed using MySQL and PostgreSQL running in Linux operating ...

2006
MATTHEW A. KERR SONYA E. SYMONS

This study examined whether children’s reading rate, comprehension, and recall are affected by computer presentation of text. Participants were 60 grade five students, who each read two expository texts, one in a traditional print format and the other from a computer monitor, which used a common scrolling text interface. After reading each text, participants were asked to recall as much as they...

2013
Shamsuzzoha B Syed Viva Dadwal Julie Storr Pamela Riley Paul Rutter Joyce D Hightower Rachel Gooden Edward Kelley Didier Pittet

Strengthening the evidence-policy interface is a well-recognized health system challenge in both the developed and developing world. Brokerage inherent in hospital-to-hospital partnerships can boost relationships between "evidence" and "policy" communities and move developing countries towards evidence based patient safety policy. In particular, we use the experience of a global hospital partne...

Journal: :BMB reports 2008
Gir Won Lee Sangsoo Kim

The genomic sequences of a huge number of species have been determined. Typically, these genome sequences and the associated annotation data are accessed through Internet-based genome browsers that offer a user-friendly interface. Intelligent use of the data should expedite biological knowledge discovery. Such activity is collectively called data mining and involves queries that can be simple, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید