نتایج جستجو برای: attempt
تعداد نتایج: 121854 فیلتر نتایج به سال:
OBJECTIVE Few studies have investigated the association between religion and suicide either in terms of Durkheim's social integration hypothesis or the hypothesis of the regulative benefits of religion. The relationship between religion and suicide attempts has received even less attention. METHOD Depressed inpatients (N=371) who reported belonging to one specific religion or described themse...
On Saturday, January 30, 1835, President Andrew Jackson accompanied by his Vice-President, Martin Van Buren, and the Secretaries of Treasury and Navy, entered the portico of the Capitol. President Jackson had just attended the funeral service for Representative Warren B. Davis of South Carolina. Suddenly a man in the crowd pulled a pistol from beneath his coat, extended his arm, and levelled th...
In this note we report on some shortcomings in the current theory structures of the mega database. With the present approach of statically deening axioms and signatures inside theories the usefulness of the database for concrete computations will be very limited. We give examples to point out the particular problems and present the rst ideas of a way to overcome them.
In 1979 Frankl conjectured that in a finite union-closed family F of finite sets, F = {∅} there has to be an element that belongs to at least half of the sets in F . We prove this when | F| 10.
Suicide attempt linked to breakdown he Golgi apparatus breaks down temporarily to segregate into daughter cells during mitosis, but during apoptosis the organelle fragments irreversibly. On page 637, Chiu et al. report that cleavage of a critical tethering protein during apoptosis not only drives the fragmentation of the Golgi apparatus, but also appears to help propagate the apoptotic signal. ...
At CMS 2006 Bringer et al. show how to conceal the algebraic structure of a “traceable block cipher” by adding perturbations to its description. We here exploit and strengthen their ideas by further perturbing the representation of a cipher towards a white box implementation. Our technique is quite general, and we apply it – as a challenging example in the domain of white box cryptography – to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید