نتایج جستجو برای: identity like

تعداد نتایج: 761739  

Journal: :Inf. Sec. Techn. Report 2006
Katrin Borcea-Pfitzmann Marit Hansen Katja Liesebach Andreas Pfitzmann Sandra Steinbrecher

To enable trustworthy privacy, identity management has to be user-controlled, i.e. each user administrates his/her partial identities being supported by an identity management system running on his/her machines under his/her control. Past work on user-controlled identity management focused on isolated users administrating their partial identities mainly used towards organizations, e.g., shops, ...

Hossein Hosseini , Mohammad Hassan Bozorgmehri-Fard , Saied Charkhkar ,

Case Report: Recently a 20-day-old layer flock with mortality has been submitted to the PCR Lab. Infectious Bronchitis Virus (IBV) has been detected in the clinical samples. Results: A phylogenetic tree based on a partial S1 gene sequence showed Iranian IBV variant located in LX4-type cluster. This cluster include all QXIBV-type detected in China and European countries. The highest sequence hom...

Journal: :iranian journal of allergy, asthma and immunology 0
fatemeh dousti department of immunology, faculty of medicine, ahvaz jundishapur university of medical sciences, ahvaz, iran mohammad-ali assarehzadegan department of immunology, faculty of medicine, ahvaz jundishapur university of medical sciences, ahvaz, iran and department of immunology, school of medicine, iran university of medical sciences, tehran, iran payam morakabati department of immunology, faculty of medicine, ahvaz jundishapur university of medical sciences, ahvaz, iran gholam reza khosravi department of immunology, faculty of medicine, ahvaz jundishapur university of medical sciences, ahvaz, iran bahareh akbari department of immunology, faculty of medicine, ahvaz jundishapur university of medical sciences, ahvaz, iran

pollen from mesquite (prosopis juliflora) is one of the important causes of immediate hypersensitivity reactions in the arid and semi-arid regions of the world. the aim of present study is to produce and purify the recombinant form of allergenic ole e 1-like protein from the pollen of this allergenic tree. immunological and cross-inhibition assays were performed for the evaluation of ige-bindin...

Journal: :PLoS Computational Biology 2009
Thorsten Lenser Günter Theißen Peter Dittrich

DEF-like and GLO-like class B floral homeotic genes encode closely related MADS-domain transcription factors that act as developmental switches involved in specifying the identity of petals and stamens during flower development. Class B gene function requires transcriptional upregulation by an autoregulatory loop that depends on obligate heterodimerization of DEF-like and GLO-like proteins. Bec...

2003
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

2016
Lin Jiu Christophe Vignat

We first extend the digital binomial identity as given by Nguyen et al. to an identity in an arbitrary base b, by introducing the b-ary binomial coefficients. Then, we study the properties of these coefficients such as their orthogonality, their link with Lucas’ theorem and their extension to multinomial coefficients. Finally, we analyze the structure of the corresponding b-ary Pascal-like tria...

2002
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

2016
Stephanie Y. Chen Daniel M. Bartels Oleg Urminsky

We investigate the age-old questions of what makes us who we are and what features of identity, if changed, would make us a different person. Previous approaches to identity have suggested that there is a type of feature that is most defining of identity (e.g., autobiographical memories or moral qualities). We propose a new approach to identity that suggests that, like concepts in general, more...

2017
Anna Colavecchio Julie Jeukens Luca Freschi Jean-Guillaume Edmond Rheault Irena Kukavica-Ibrulj Roger C. Levesque Jeffrey LeJeune Lawrence Goodridge

Two similar phage-like plasmids carrying CTX-M-15 resistance cassettes were identified from two environmental Escherichia coli isolates. They demonstrate strong nucleotide sequence identity to the phage-like plasmid pECOH89 and Salmonella bacteriophage SSU5.

2009
Christina S. Kim

The exact nature of the similarity that must obtain between antecedent and ellipsis site has been under debate. Intuitively, it is a condition associated with recoverability: when a VP-gap is encountered, a VP representation from the preceding context must be interpreted in the empty VP position1. Syntactic identity has been argued for based on sentences where syntactic non-identity results in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید