نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

Journal: :Journal of chromatography. B, Analytical technologies in the biomedical and life sciences 2011
Shuren Ma Gerard M Turino Yong Y Lin

The aim of this study is to develop a standardized LC-MS/MS method for accurate measurement of desmosine (DES) and isodesmosine (IDS) in all body fluids as biomarkers for in vivo degradation of matrix tissue elastin in man and animals. A reproducible three-step analytical procedure: (1) sample hydrolysis in 6N HCl, (2) SPE by a CF1 cartridge with addition of acetylated pyridinoline as internal ...

2002
Steve Jones Stephen Lundy Gordon W. Paynter

This paper describes the Interactive Document Summariser (IDS). IDS provides dynamic control over document summary characteristics, such as length and topic focus, so that changes made by the user are instantly reflected in an on-screen summa y. ‘Summa y-in-context’ views allow users to move flexibly between summaries and their source documents. IDS adopts the technique of sentence extraction, ...

Journal: :Biochemical and biophysical research communications 2008
Shinsuke Fujiwara Aiko Yamanaka Yosuke Yamada Kazutake Hirooka Hiroki Higashibata Wakao Fukuda Jun-ichi Nakayama Tadayuki Imanaka Ei-ichiro Fukusaki

The trans-polyisoprene compounds are synthesized by trans-isoprenyl diphosphate synthase (IDS) with consecutive condensation of isopentenyl diphosphate (IPP) to dimethylallyl diphosphate (DMAPP). The in vitro condensation by IDS does not proceed efficiently by hydrophobic interaction between IDS and the hydrocarbon of longer products. In the present study, the enzymatic synthesis of trans-polyi...

2002
Nathan Carey Andrew J. Clark George M. Mohay

Over the past decade Intrusion Detection Systems (IDS) have been steadily improving their efficiency and effectiveness in detecting attacks. This is particularly true with signature-based IDS due to progress in attack analysis and attack signature specification. At the same time system complexity, overall numbers of bugs and security vulnerabilities have increased. This has led to the recogniti...

1995
Marco Ramoni

Innuence Diagrams (ids) are a graphic formalism able to provide a compact representation of decision problems. ids are based on the axioms of probability and decision theory, and they deene a normative framework to model decision making. Unfortunately, ids require a large amount of information that is not always available to the decision maker. This paper introduces a new class of ids, called I...

Journal: :CoRR 2013
Nils Ulltveit-Moe Vladimir A. Oleshchuk

This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis sho...

Journal: :Inf. Manag. Comput. Security 2012
Teodor Sommestad Amund Hunstad

When system administrators monitor the security of computer network(s) they often use an intrusion detection system (IDS). The IDS examines events (in network traffic, operating systems, etc.) and raises an alarm if the events are believed to be symptoms of an intrusion. A number of studies investigate IDSs from a technical perspective. These studies typically investigate the technical quality ...

2015
Agnieszka Czoska Katarzyna Klessa Maciej Karpinski

Infant-directed speech (IDS) is reported to differ significantly from adult-directed speech (ADS) in its acoustic-phonetic properties. In IDS, phonetic features of individual speech sounds tend to be intensified [6, 14, 20]. An example phenomenon documented for IDS in several languages is vowel hyperarticulation [25]. Thus, the formant frequency values (F1, F2) vary in the two target speaking s...

2004
Kenichi Kourai Shigeru Chiba Toshio Hirotsu Toshiharu Sugawara

Due to the nature that a distributed IDS has to monitor the whole distributed system, the IDSes constructing a distributed IDS are scattered throughout hosts in the distributed system. In addition, each IDS is embedded into a host and a network in the distributed system. As such, the distributed IDSes are not separated from the distributed system and therefore cause a security problem. A distri...

Journal: :Journal of child language 2010
Sue Ann S Lee Barbara L Davis

This study compared segmental distribution patterns for consonants and vowels in English infant-directed speech (IDS) and adult-directed speech (ADS). A previous study of Korean indicated that segmental patterns of IDS differed from ADS patterns (Lee, Davis & MacNeilage, 2008). The aim of the current study was to determine whether such differences in Korean are universal or language-specific. R...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید