نتایج جستجو برای: path file

تعداد نتایج: 195250  

2009
Liana STANESCU Dumitru BURDESCU

The paper presents original ways of using topic maps for information structuring and retrieval in medical elearning domain. The topic map is mainly used for graphical visualization of the MeSH thesaurus containing medical terms. The hierarchical structure of the descriptors from MeSH thesaurus that has also multiple associative and equivalence relationships between medical terms can be properly...

2014
K. Ramalakshmi P. K. Sasikumar

Peer-to-peer (P2P) is a distributed system without any centralized control or hierarchical organization nodes organize itself in a dynamic way. It allows different applications to achieve efficient and simple file sharing. Without any authentication adversary nodes can spoof the identity and spoil the integrity by falsifying the messages in the overlay. This enables malicious nodes to launch ma...

1997
Fabio A. Schreiber Marcello L. Falleni

1 work partially supported by CSISEI-CNR Abstract Mobility in cellular networks requires to manage handovers, which occur as users move from one cell to another. Their effects, which are easily overcome for speech, may seriously affect data transmissions. In this paper we report about tests for evaluating the quality of transmission for data applications on a GSM cellular network. Static tests,...

Journal: :Iranian endodontic journal 2016
Marcelo Santos Coelho Carlos Eduardo Fontana Augusto Shoji Kato Alexandre Sigrist de Martin Carlos Eduardo da Silveira Bueno

INTRODUCTION The aim of this in vitro study was to evaluate the effects of establishing glide path on the centering ability and preparation time of two single-file reciprocating systems in mesial root canals of mandibular molars. METHODS AND MATERIALS Sixty extracted mandibular molars with curvatures of 25-39 degrees and separate foramina for the mesiobuccal and mesiolingual canals, were divi...

Journal: :EPJ Web of Conferences 2019

Journal: :JOURNAL OF THE BREWING SOCIETY OF JAPAN 1992

Journal: :Igaku Toshokan 1985

2013
Ling Ren Xiangyao Yu Christopher W. Fletcher Marten van Dijk Srinivas Devadas

Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users’ private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence ...

2006
Amitabha Banerjee Biswanath Mukherjee Dipak Ghosal

The bandwidth available in a high-speed backbone network today is much greater than the capacity at the edge devices. As an example, when the transmission line rate is 10 Gbps, the end computing machine (end-system) may not be able to cope with the arriving data rate and is hence often a bottleneck for the data transfer. This performance bottleneck depends on the end-system workload. A key defi...

2009
Moonzoo Kim Yunho Kim

In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully, it is essential that flash memory be controlled correctly through file system software. However, as is typical for embedded software, conventional testing methods often fail to detect hidden flaws in the software due t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید