نتایج جستجو برای: path file

تعداد نتایج: 195250  

Journal: :iranian endodontic journal 0
kiamars honardar department of endodontics, dental school, shahed university of medical sciences, tehran, iran nahal vesal endodontist, tehran, iran faeze hamze general practitioner, tehran, iran kiumars nazarimoghadam department of endodontics, dental school, shahed university of medical sciences, tehran, iran hossein labaf department of endodontics, dental school, shahed university of medical sciences, tehran, iran laila shakeri department of endodontics, dental school, shahed university of medical sciences, tehran, iran

introduction: this study was carried out to compare the capability of k-files with mtwo rotary file in terms of negotiation as well as depth of penetration in second mesiobuccal (mb2) canal of maxillary first molar. materials and methods: a total of 32 mb2 canal of maxillary first molars having different root curvatures (not more than 30 degree) and root lengths were selected and then detected ...

Journal: :IEEE Trans. Parallel Distrib. Syst. 2003
Li Xiao Zhichen Xu Xiaodong Zhang

We present several protocols to achieve mutual communication anonymity between an information requester and a provider in a P2P information-sharing environment, such that neither the requester nor the provider can identify each other, and no other peers can identify the two communicating parties with certainty. Most existing solutions achieve mutual anonymity in pure P2P systems without any tru...

Journal: :Scientific American 1876

Journal: :British Journal of Social Work 2023

Journal: :Comput. J. 1982
Arvola Chan Bahram Niamir

The estimation of the cost of processing a query using a particular access path under a given physical organization has important applications in integrated database environments. When records in a file are stored in fixed-length physical blocks in secondary storage, and mechanisms are available whereby a query can be resolved without the accessing of all of the records, an important measure of...

2009
Bernhard Schandl

File systems are highly interesting sources of information since large amounts of digital information are stored using plain file hierarchies. However the question of how file system data can be integrated into the Web of Data has not yet bet been sufficiently addressed. In this paper we give a short overview on TripFS, a Java-based server software that extracts RDF descriptions from a file sys...

2008
Ghulam Memon

A Peer to Peer (P2P) network is one of the most popular forms of distributed resource sharing. The idea behind P2P networks is that several users (peers), distributed globally, share different resources among themselves without the presence of a central management authority. Examples of the resources are files, CPU cycles and network bandwidth. The most common use of P2P networks is to share fi...

Journal: :JSW 2013
Natarajan Meghanathan

We illustrate the use of source code analysis to identify and remove the following software security vulnerabilities: (i) Hardcoded Password, (ii) Empty Password Initialization, (iii) Denial of Service, (iv) System Information Leak, (v) Unreleased Resource and (vi) Path Manipulation. We propose one or more solution approaches to remove or at least mitigate each of these vulnerabilities that hav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید