نتایج جستجو برای: dos

تعداد نتایج: 127092  

Journal: :Archivum immunologiae et therapiae experimentalis 1993
A M Waaga M Krzymański K Ulrichs B Wierusz-Wysocka W Müller-Ruchholtz

Since systematic hematological studies on blood and bone marrow changes after treatment with 15-Deoxyspergualin (DOS) are lacking, a quantitative assessment was performed fourteen or twenty eight days after intraperitoneal application of DOS to rats. Further observations done 7 and 14 days after discontinuation of DOS administration allowed analysis of bone marrow regeneration. DOS induced lymp...

2012
Kai Wang Jia Chen Huachun Zhou

Content-Centric Networking (CCN) is a novel networking paradigm making named data the first class entity rather than IP address. That is, it cares about which data to fetch rather than which host to reach. One key feature of CCN is the content caching that CCN routers are caching named contents instead of IP addresses, which makes the effect of Denial-of-Service (DoS) attack different from in T...

2018
Hongguo Cao Yani Bian Fei Zhang Yunshu Tang Caixia Li Jiemei Chen Xiaorong Zhang

OBJECTIVE cAMP and mature promoting factor (MPF) play critical roles during the maturation of mammalian oocytes. The aim of this study was to produce the offspring from denuded oocytes (DOs) in mice by regulating cAMP and MPF. METHODS In this study, we used DOs at the germinal vesicle (GV) stage in mice and regulated levels of cAMP and MPF in DOs by adding Forskolin and PD166285 during in vit...

1995
Wolfgang Pohl

In order to get more experiences about user modeling and more knowledge about which user modeling techniques are really helpful, these techniques must be applied. In order to make BGP-MS available for a wide range of applications, the BGP-MS project decided to make a port of its workstation-based software to the PC/DOS/MS-Windows platform. This paper describes the main aspects in which the resu...

2009
Sven Ehlert

The Session Initiation Protocol (SIP) is the multimedia communication protocol of the future. Used for Voice-over-IP (VoIP), Internet Multimedia Subsystem (IMS) and Internet Protocol Television (IPTV), its concepts are based on mature and open standards and its use is increasing rapidly within recent years. However, with its acceptance as a mainstream communication platform, security concerns b...

ژورنال: مواد پرانرژی 2014

In this paper, diffusion and migration of Dioctyl sebacate (DOS) and Dioctyl phetalate (DOP) plasticizers at the interface of propellant and insulation as well as different distances from the interface in composite solid propellant based on HTPB / AP using both experimental and modeling have been investigated. Solid composite propellant and Nitrile Butadiene Rubber (NBR) insulation containing D...

2007
Yen-Hung Hu

This paper investigate the behavior of DoS attacks while they are affecting the stability of computer systems as well as exploit a distributed framework which will monitor, detect, and prevent DoS attacks. This framework includes several distributed monitors implemented at the critical components and a management center which is used to detect and prevent DoS attacks.

2001
Yan Chen Adam W. Bargteil David Bindel Randy H. Katz John Kubiatowicz

Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this paper, we propose a simulation-based methodology and apply it to attacks on object location services such as DNS. Our results allow us to contrast the DoS resilience of three distinct architectures for object location.

Journal: :Science 2017
Thorsten Dittmar Aron Stubbins Takamitsu Ito Daniel C Jones

Ksionzek et al (Reports, 28 October 2016, p. 456) provide important data describing the distribution of dissolved organic sulfur (DOS) in the Atlantic Ocean. Here, we show that mixing between water masses is sufficient to explain the observed distribution of DOS, concluding that the turnover time of refractory DOS that Ksionzek et al present cannot be deduced from their data.

2007
Craig Shue Brian Kopecky Chris Weilemann

Denial of Service (DoS) attacks, a damaging assault on computer networking infrastructure, have been extensively examined by the digital computing community. However, no work has been done to examine the ability of Extended Analog Computers (EAC) to detect DoS attacks. In this paper, we discuss how EACs could be used in DoS detection.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید