نتایج جستجو برای: 9 mix

تعداد نتایج: 511883  

1999
Yannis Papakonstantinou Pavel Velikhov

Mediation is an important application of XML. The MIX mediator uses Document Type De nitions (DTDs) to assist the user in query formulation and query processors in running queries more e ciently. We provide an algorithm for inferring the view DTD from the view de nition and the source DTDs. We develop a metric of the quality of the inference algorithm's view DTD by formalizing the notions of so...

Journal: :JORS 2011
Mercedes Esteban-Bravo Nora Lado

Rival firms often cooperate horizontally in order to share risks and achieve scale advantages in production or in their research and development projects. The output of these strategic alliances is usually sold by the individual ally company under its own brand and using its own marketing mix strategies. Marketing strategies create a cumulative effect that is reflected in brand value. Although ...

2002
Dogan Kesdogan Dakshi Agrawal Stefan Penz

A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present a model where we can determine the pr...

2010
Jeroen van de Graaf

All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[10], which uses blind signatures so...

Journal: :International journal for vitamin and nutrition research. Internationale Zeitschrift fur Vitamin- und Ernahrungsforschung. Journal international de vitaminologie et de nutrition 2008
Masako Nakano Natsumi Orimo Nakako Katagiri Masahito Tsubata Jiro Takahashi Nguyen Van Chuyen

In this study, the effect of dietary antioxidants, such as astaxanthin and Flavangenol, and a combination of both, in counteracting oxidative stress in streptozotocin-induced diabetes was investigated. Streptozotocin-induced diabetic rats were divided into four groups: control, astaxanthin, Flavangenol, and combined astaxanthin and Flavangenol (mix group). Each group other than the control grou...

Journal: :Nucleic acids research 1991
S W John G Weitzner R Rozen C R Scriver

1. Collect 5 ml of blood in a vacutainer tube (Becton Dickinson) containing EDTA and mix. 2. Make volume up to 10 ml with solution 1 (10 mM Tris pH 7.6; 10 mM KC1; 10 mM MgCy. 3. Add 120 /il Nonidet P40 (BDH) to lyse the cells. Mix well by inverting several times. 4. Spin down the nuclear pellet at 2000 rpm for 10 mins. 5. Pour off the supernatant without dislodging the pellet. The pellets can ...

Journal: :Forensic science international 2012
Gregory S Buzard Daniel Baker Mark J Wolcott David A Norwood Leslie A Dauphin

The Centers for Disease Control and Prevention and United States Army Research Institute for Infectious Diseases have developed real-time PCR assays for the detection of bioterrorism threat agents. These assays all rely on a limited number of approved real-time PCR master mixes. Because the availability of these reagents is a critical element of bioterrorism preparedness, we undertook a joint n...

2005
SungRan Cho Nick Koudas Divesh Srivastava

We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data with a wide variety of meta-data, such as quality and security assessments. We address the meta-data indexing problem of efficiently identifying the XML elements along a location step in an XPath query, that satisfy meta-d...

2001
Dogan Kesdogan

In our work we use queuing theory both for security (i.e. anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today’s deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their ...

Journal: :RFC 1973
David C. Walden

Box MIX and MIXAL are available on the UCSD B6700; although, according to Ken Bowles, they are not currently being handled as fully supported products, and there may be some remaining bugs in the systems. However, MIX and MIXAL are available for network users, and Ken says they will be happy to receive notification of any errors found in the MIX and MIXAL and will attempt to get corrections mad...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید