4 resultados para hard to heal wounds

em Nottingham eTheses


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The publication of material in electronic form should ideally preserve, in a unified document representation, all of the richness of the printed document while maintaining enough of its underlying structure to enable searching and other forms of semantic processing. Until recently it has been hard to find a document representation which combined these attributes and which also stood some chance of becoming a de facto multi-platform standard. This paper sets out experience gained within the Electronic Publishing Research Group at the University of Nottingham in using Adobe Acrobat software and its underlying PDF (Portable Document Format) notation. The CAJUN project1 (CD-ROM Acrobat Journals Using Networks) began in 1993 and has used Acrobat software to produce electronic versions of journal papers for network and CD-ROM dissemination. The paper describes the project's progress so far and also gives a brief assessment of PDF's suitability as a universal document interchange standard.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an extent that the resources required to successfully mount the attack become prohibitive. The key idea presented is to combine a token bucket filter with a realtime correlation algorithm. The proposed algorithm throttles alert output from the IDS when an attack is detected. The attack graph used in the correlation algorithm is used to make sure that alerts crucial to forming strategies are not discarded by throttling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an extent that the resources required to successfully mount the attack become prohibitive. The key idea presented is to combine a token bucket filter with a realtime correlation algorithm. The proposed algorithm throttles alert output from the IDS when an attack is detected. The attack graph used in the correlation algorithm is used to make sure that alerts crucial to forming strategies are not discarded by throttling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The self-ordered pointing test (SOPT; Petrides & Milner, 1982) is a test of non-spatial executive working memory requiring the ability to generate and monitor a sequence of responses. Although used with developmental clinical populations there are few normative data against which to compare atypical performance. Typically developing children (5!11 years) and young adults performed two versions of the SOPT, one using pictures of familiar objects and the other hard-to-verbalise abstract designs. Performance improved with age but the children did not reach adult levels of performance. Participants of all ages found the object condition easier than the abstract condition, suggesting that verbal processes are utilised by the SOPT. However, performance on the task was largely independent from verbal and nonverbal cognitive ability. Overall the results suggest that the SOPT is a sensitive measure of executive working memory.