نتایج جستجو برای: bot networks

تعداد نتایج: 430144  

2014
Ray Gervacio F. Blanco Joseph Califano Barbara Messing Jeremy Richmon Jia Liu Harry Quon Geoffrey Neuner John Saunders Patrick K. Ha Sheila Sheth Maura Gillison Carole Fakhry

BACKGROUND Base of tongue (BOT) is a difficult subsite to examine clinically and radiographically. Yet, anatomic delineation of the primary tumor site, its extension to adjacent sites or across midline, and endophytic vs. exophytic extent are important characteristics for staging and treatment planning. We hypothesized that ultrasound could be used to visualize and describe BOT tumors. METHOD...

2016
Setareh Akhavan Azamsadat Mousavi Abbas Alibakhshi

Borderline ovarian tumors (BOT) consist of epithelial ovarian lesions that express cytological features of malignancy, but unlike malignant ovarian tumors, do not show obvious stromal invasion. The tumor incidence is between 1.8 and 4.8 per 100,000 females per year. The two major groups of BOT include serous BOT (S-BOT) and mucinous BOT (M-BOT). S-BOTs are divided into two categories: tumors li...

Journal: :Anticancer research 2010
Jalid Sehouli Guelten Oskay-Oezcelik Klaus Pietzner Frank Chen Alexandra Coumbos Silvia Darb-Esfahani Beatrix Schuback Georg Heinrich Christel Kronenberger Michael Lorsbach Werner Lichtenegger Radoslav Chekerov

Borderline ovarian tumour (BOT) represents a rare and special tumour entity. Despite a generally favourable prognosis for patients with BOT, the presence of invasive peritoneal implants decreases the survival rate to 30-50%. In contrast to ovarian cancer, only few data exist concerning the current clinical management of patients with BOT. For this reason, the present analyses were performed for...

2015
Matteo Cristani Elisa Burato Katia Santacà Claudio Tomazzoli

Hiding true personality behind a façade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a façade behaviour coupled with a second life consisting mainly in illegal activities and their planning. Nowadays a few cases of behaviours that hide a dangerous activity, possibly illegal, behind an ...

2003
Manthos Kazantzidis Dario Maggiorini Mario Gerla

Available bandwidth knowledge is very useful to network protocols. Unfortunately, available bandwidth is also very difficult to measure in packet networks, where methods to guarantee and keep track of the bandwidth (eg, weighted fair queuing scheduling) do not work well, for example the Internet. In this paper we are dealing with an available bandwidth sampling technique based on the observatio...

2013
Taehyoung Shim Dong-Min Kim Seong-Lyun Kim

Due to the development of information and communication technologies, it is difficult to handle the billions of connected machines. In this paper, to cope with the problem, we introduce machine social networks, where they freely follow each other and share common interests with their neighbors. We classify characteristics and describe required functionalities of socially connected machines. We ...

Journal: :Revista chilena de pediatría 1953

2017
Nikan Chavoshi Hossein Hamooni Abdullah Mueen

Unusually high correlation in activities among users in social media is an indicator of bot behavior. We have developed a system, called DeBot, that identifies such bots in Twitter network. Our system reports and archives thousands of bot accounts every day. DeBot is an unsupervised method capable of detecting bots in a parameter-free fashion. In February 2017, DeBot has collected over 710K uni...

2007
Christoph Hermann Helmuth Melcher Stefan Rank Robert Trappl

Real-Time Strategy (RTS) games are a challenging genre for the design of Intelligent Virtual Agents. We were interested whether incorporating a simple emotional model to an existing bot-script improves playing strength. We implemented a bot for Microsoft's RTS game “Age of Mythology”. The emotional model is based on the “Big-Five” and the Emotion-Connectionist Model. Four variants of the bot we...

2013
Junjie Zhang Yinglian Xie Fang Yu David Soukal Wenke Lee

Modern attackers increasingly exploit search engines as a vehicle to identify vulnerabilities and to gather information for launching new attacks. In this paper, we perform a large-scale quantitative analysis on bot queries received by the Bing search engine over month-long periods. Our analysis is based on an automated system, called SBotScope, that we develop to dissect large-scale bot querie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید