نتایج جستجو برای: bot

تعداد نتایج: 2803  

Journal: :Concurrency and Computation: Practice and Experience 2012
Marco Aurélio Stelmar Netto Rajkumar Buyya

Metaschedulers can distribute parts of a Bag-of-Tasks (BoT) application among various resource providers in order to speed up its execution. The expected completion time of the user application is then calculated based on the run time estimates of all applications running and waiting for resources. However, due to inaccurate run time estimates, initial schedules are not those that provide users...

2007

Networks of compromised machines called botnets are one of the most threatening adversaries over the Internet due in large part to the difficulty of identifying botnet traffic patterns. We have witnessed that existing signature-based detection and protection methods are ineffective in dealing with new unknown bots. By slightly modifying the code of an existing bot, bot commanders can bypass mos...

2001
Lisa E. Noonan Lorne M. Sulsky

We examined the utility of frame-of-reference (FOR) training and behavioral observation training (BOT) for enhancing rating accuracy in a field study involving Canadian military personnel. Participants were randomly assigned to either (a) FOR training, (b) FOR training + BOT, or (c) control training. Participants were assessed on a variety of training program evaluation criteria, including rati...

2014
Tomoaki Shiba Mao Takahashi Takatoshi Maeno

Aim. To determine whether there is a significant correlation between the optic nerve head (ONH) circulation determined by laser speckle flowgraphy (LSFG) and kidney function. Materials. Seventy-one subjects were investigated. The estimated glomerular filtration rate (GFR) and serum creatinine, cystatin C, and urinary albumin excretion were measured. The ONH circulation was determined by an anal...

2015
Kevin Corti Alex Gillespie

We use speech shadowing to create situations wherein people converse in person with a human whose words are determined by a conversational agent computer program. Speech shadowing involves a person (the shadower) repeating vocal stimuli originating from a separate communication source in real-time. Humans shadowing for conversational agent sources (e.g., chat bots) become hybrid agents ("echobo...

2010
F. John Krautheim Dhananjay S. Phatak Alan T. Sherman

Private Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. Private Virtual Infrastructure is under control of the information owner while the cloud fabric is under control of the service provider. The Private Vi...

2004
R. B. WITHROW W. H. KLEIN V. ELSTAD

33. SIERP, HERMANN tSber die Beziehungen zwischen Individuengrbosse, Organgr6sse und Zellengrosse, mit besonderer Beriicksichtigung des erblichen Zwergwuchses. Jahrb. Wiss. Bot. 53: 55-124. 1913. 34. SINNOTT, E. W. The morphogenetic relationships between eell and organ in the petiole of Acer. Bull. Torrey Bot. Club 57: 1-20. 1930. 35. SINNOTT, E. W. A developmental analysis of the relation betw...

Journal: :Hormone and metabolic research = Hormon- und Stoffwechselforschung = Hormones et metabolisme 2013
S-I Harashima D Tanaka S Yamane M Ogura Y Fujita Y Murata M Seike T Koizumi M Aono Y Wang N Inagaki

Basal-supported oral therapy (BOT) is often used to treat poorly controlled type 2 diabetes. However, patients sometimes experience nocturnal and early morning hypoglycemia. Thus, maintaining targeted glycemic control by BOT is limited in some patients. We assessed the efficacy and safety of replacing basal insulin by sitagliptin therapy in Japanese type 2 diabetes patients on BOT. Forty-nine s...

2017
Shehryar N Khawaja

Background: Botulinum toxin type A (BoT-A) has gained significant clinical interest in the management of masticatory muscle pain in temporomandibular disorders (TMD). This may be due to clinical success of BoT-an in treatment of other neuromuscular and refractory chronic pain disorders in the head and neck region, and the limited understanding of the underlying pathophysiology of masticatory mu...

2006
David Dagon Paul Vixie

Abstract. We describe problems inherent in the current use of antivirus software. We note that by applying a series of program transformations, virus writers can effectively evade known signature systems. By automating this process, malware authors can keep ahead of signature-based AV systems. By using so-called “queen-bot” programs, a single bot can be kept within a perpetual zero-day window.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید