Amazon Simple Storage Service (Total 268456 Papers Found)

A KEW combinatorial formulation of the Jones polynomial of a link is used to establish some basic properties of this polynomial. A striking consequence of these properties is the result that a link admitting an alternating diagram with m crossings and with no “nugatory” crossing cannot be projected with fewer than m crossings. $1. ISTRODUCTION AND STATEklENT OF RESULTS This article is concerned with classical links, that is to say closed l-manifolds embedded piecewise-linearly in the oriente ...
Target audience The scientific information derived from this study should be useful for future patient care. Purpose Recently, the median nerve at the carpal tunnel has been visualized with diffusion MRI such as diffusion tensor imaging (DTI) or diffusion tensor tractography (DTT) (1, 2). The so-called “Superman position”, prone position with the wrist over the head at the center of magnet, can provide high S/N images and is ideal for MRI acquisition of the wrist. However, it is hard to keep ...
Introduction: Chondrites have been compared to terrestrial sandstones, formed by the physical accumulation of unrelated grains followed by a lithification process. Tectonics and the simple weight of overlying layers provide the conditions for lithification of sandstones on Earth. What plays this role on meteorite parent bodies? Present day asteroids cannot compact meteorites by their own self-gravity; lithostatic pressures even in the center of Ceres are far too small. Furthermore, it is likely ...
This is supplementary information for arXiv:1204.4896, which also appeared in Physical Biology 9, 026008 (2012). In this supplementary information, we first describe in section S1 the methods used in the main text. We then show that the macroscopic spatio-genetic patterns of spatial competitions are independent of microscopic details, using both experimental and theoretical arguments: In section S3 we show experimentally that sector shapes apply also to microbes with different cell division patt ...
For rapid and optimum project development of Enterprise Application, many industries prefer Framework based structure and IaaS(Infrastructure as Services) which depend upon cloud service providers such as Amazon, Google, Microsoft. This paper presents Comparative study of different Frameworks integrations for finding suitable and efficient frameworks integrations for e-learning application according to pros and cons of respective framework integration. We can arrange Model-View-Controller archit ...
Kryptoglanduläre Analfisteln sind mit 2 pro 10.000 Einwohner/Jahr eine häufige Erkrankung mit einem Häufigkeitsgipfel bei jungen männlichen Erwachsenen. Eine nicht adäquate Behandlung kann zu einer Beeinträchtigung der Lebensqualität und insbesondere zur Reduktion der Kontinenzleistung führen. Aufbauend auf der S3-Leitlinie aus dem Jahr 2011 wurde eine erneute systematische Literaturrecherche durchgeführt, und die Leitlinien wurden aktualisiert. Relevante randomisierte Studien sind weit ...
Let Sm denote the m-vertex simple digraph formed by m− 1 edges with a common tail. Let f(m) denote the minimum n such that every n-vertex tournament has a spanning subgraph consisting of n/m disjoint copies of Sm. We prove that m lgm−m lg lgm ≤ f(m) ≤ 4m − 6m for sufficiently large m. If D is an acyclic digraph of order n, then D occurs as a subgraph of every tournament with at least 2 vertices; this follows easily by induction on n. Special digraphs can be guaranteed to appear even wh ...
2014 From X-ray experiments, performed on both single domains and powder samples, the two ordered smectic phases (S4 and S3) exhibited by a few n-(alkoxybenzylidene)-p-n-alkylaniline compounds appear respectively as SBc (tilted) and SBA (normal) phases : the phase transition between these two phases is a first order transition. Moreover, the description of the nature of these phases must also take into account an extra feature observed on some X-ray powder patterns : the splitting of the ring co ...
Access rules to electronic patient records (EPR) have been issued by the Belgian Council of Physicians. Access to identifiable data of the EPR is restricted to anyone responsible for diagnosis, treatment and continuity of care of the patient. By delegation, associated personnel, like secretaries, can also be authorised to have access. A new perspective is given by the availability in 2003 of a national identification card allowing electronic signature of patients. It could not only authorise but ...
While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with policy-based file assured deletion. FADE is built upon standard cryptographic techniques, such that it encrypts outsourced data files to guarantee their privacy ...
r e P liCated storaGe systems for the cloud deliver different consistency guarantees to applications that are reading data. Invariably, cloud storage providers redundantly store data on multiple machines so that data remains available in the face of unavoidable failures. Replicating data across datacenters is not uncommon, allowing the data to survive complete site outages. However, the replicas are not always kept perfectly synchronized. Thus, clients that read the same data object from differe ...
Recendy a novel faimly of echinoderm ACKNOWLEDGEMENTS: neuropepddes, the SALMFamides, has been characterized. Sl and S2 were isolated from radial This work was supported by a cooperation grant nerve cords of the starfishes Asterias rubens and CGRI-British Council-FNRS. Financial support Asteriasforbesi (Hphick et al. 1991). S3 and S4 from FDS (UCL) and FRFC (number 6.231.85), were isolated and sequenced from extracts of the Contribution of the "Centre Interuniversitaire de digestive system of th ...
E. Gallardo,1,* L. J. Martínez,2 A. K. Nowak,1 D. Sarkar,1,3 H. P. van der Meulen,1 J. M. Calleja,1 C. Tejedor,1 I. Prieto,2 D. Granados,2 A. G. Taboada,2 J. M. García,2 and P. A. Postigo2 1Departamento de Física de Materiales, Universidad Autónoma de Madrid, E-28049 Madrid, Spain 2Instituto de Microelectrónica de Madrid, Centro Nacional de Microelectrónica, Consejo Superior de Investigaciones Científicas, Isaac Newton 8, PTM Tres Cantos, E-28760 Madrid, Spain 3Department of Physics and A ...
Cloud computing is a new model of “computing on demand” that is emerging as an alternate to in-house computing. Users “buy” time on these compute-resources as needed without worrying about installing, maintaining or upgrading local infrastructure. Cloud computing is very useful and highly efficient for meeting peak loads, short-term demands, changing user base, and fault tolerance. In association with cloud computing, development has also occurred in the area of provisioning demand-based ...
With the term 'healthy' parasite carriers persons are designed harbouring parasites, whmh, however, do not cause them sufficient trouble to make them seek medical advice. So such persons are not actually healthy, although they are supposed to be so, The extensive investigations of SWELLENGREBEI~ C.S ha~e' made it clear that these 'healthy carriers are of paramount slgmficance for the epidemiology of benign tertian in this country VA~ THIEI:'/6) and SWELLENGREBEL and DE BUCK (4) have demonstrated ...
We describe a set of security APIs that grant federated access to a user's cloud resources, and that also allow the user to grant access to his resources to anyone from anywhere at any time. The APIs implement federated access to clouds, fine grained access controls and delegation of authority. We have integrated these APIs into two cloud applications in order to validate their utility. This paper describes the conceptual model and architecture of the APIs, as well as their integration into the ...
The 3<sup>rd</sup> heart sound (S3) is normally heard during auscultation of younger individuals, but it is also common in many patients with heart failure. Compared to the 1<sup>st</sup> and 2<sup>nd </sup> heart sounds, S3 has low amplitude and low frequency content, making it hard to detect (both manually for the physician and automatically by a detection algorithm). We present an algorithm based on a recurrence time statistic which is sensitive to changes ...
Biometr ic datasets are growing in size with time. Procurement of such datasets and resources for development and evaluation of biometr ic algor ithms is expensive, time consuming and often requires exper tise in systems software. Our goal in this project is to build a cloud-based evaluation system, which can host a common dataset and allow the submission of algor ithms either as source code or Linux x-86 executable, to enforce a standard exper imental protocol, and to provide results in a stand ...
Die Hormontherapie (HT) in der Peri- und Postmenopause ist eine der am häufigsten verordneten Pharmakotherapien. Sie sollte nur bei eindeutiger Indikation im Sinne der vorliegenden Leitlinien Anwendung finden. Bei der Indikationsstellung gilt es, individuelle gesundheitsrelevante Faktoren zu beachten. Kontraindikationen müssen vor Therapiebeginn ausgeschlossen werden. Postmenopausal endocrine therapy is one of the most commonly prescribed forms of pharmacotherapy. It should only be performed i ...
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. Most such systems assume benign fault model which can’t depict the malicious actions. The goal of Byzantine Fault Tolerance protocol (BFT for short) is to mask the malicious behaviors and it has been proved that some new proposed BFTs are suitable to support practical applica ...
Die S3-Leitlinie zu Hormontherapie (HT) in der Postmenopause macht auf ungesicherte Indikationen aufmerksam und warnt vor bestehenden Risiken. Bis heute gibt es keine geeigneten Studien, die einen Nutzen einer postmenopausalen HT zur kardiovaskulären Prävention ausreichend belegen. In einer Subgruppenanalyse der Women’s Health Initiative (WHI) ließ sich in der Gruppe der 50- bis 59-Jährigen ein Trend zu Risikominderung erkennen, während bei Beginn einer HT in höherem Alter kein Nutzen na ...
Background. Recently published efficacy data for 13-valent pneumococcal conjugate vaccine (PCV13) and 23-valent pneumococcal polysaccharide vaccine (PPV23) provides an opportunity to update cost-effectiveness analyses of the current ACIP recommendations as well as potential extensions of the ACIP recommendations. Methods. We applied an economic model in a US cohort of 50-year old adults to evaluate the cost-effectiveness of three pneumococcal vaccination strategies. Consistent with ACIP recommen ...
Assuming that the lepton, quark and Higgs fields belong to the three-dimensional reducible representation of the permutation group S3, we suggest a minimal S3 invariant extension of the standard model. We find that in the leptonic sector the exact S3×Z2 symmetry, which allows 6 real independent parameters, is consistent with experimental data and predicts the bi-maximal mixing of the left-handed neutrinos and that the third neutrino is the lightest neutrino. Z2 is anomaly-free, but forbids CP-v ...
Das klinische Schockraummanagement wird durch interprofessionelle diagnostische und therapeutische Maßnahmen geprägt. Die aktuelle S3-Leilinie Polytrauma-/Schwerverletzten-Behandlung konstatiert als Grad-A-Empfehlung, dass feste Teams (sog. Schockraumteams) nach vorstrukturierten Plänen arbeiten und/oder ein spezielles Training absolviert haben sollen. Zur konsequenten Umsetzung an einem überregionalen Traumazentrum wurde der Bonner Schockraummanagement-Kurs® entwickelt und eingeführt. Ada ...
Flow size statistics is a fundamental task of passive measurement. In order to bound the estimation error of passive measurement for both small and large flows, previous probabilistic counter updating algorithms used linear or nonlinear sampling function to automatically adjust the sampling rate. However, each of these methods employed a pre-set and fixed sampling function during the measurement period. As a result, the performance would vary for different flow distributions. In this paper, we p ...
1. The ability to decompose choline is widespread among aerobic microorganisms since representatives of the genera Agrobacterium, Arthrobacter, Micrococcus, Pseudomonas, Rhizobium, and Streptomyces and a large number of coryneform bacteria were found to grow with choline as the sole C- and N-source. 2. Almost all the coryneforms isolated from soil and dairy waste activated sludge displayed this ability in contrast to those isolated from cheese and, be it to a less extent, those from the phyllosp ...
We present a mechanism for photosynthetic 02 evolution based on a structural conversion of a Mn406 "adamantane"-like complex to a Mn404 "cubane"-like complex. EPR spectral data obtained from the S2 state of the 02-evolving complex are characteristic of a Mn404 cubane-like structure. Based on this structure for the manganese complex in the S2 state as well as a consideration of the other evidence available on the natural system and the coordination chemistry ofmanganese, structures are proposed f ...
Scientists very often have specific requirements regarding the IT services to support their research and very often standardized offerings of their service providers do not fit. At KIT we aim to build a private Cloud to offer flexible infrastructure services that can easily be utilized and managed by end users according to their needs. With Eucalyptus, an open source solution exists that is fully compatible with Amazon EC2, S3 and EBS. This paper compares the performance of a cloud computing inf ...
Shimizu T1, Shimizu S2, Wada N3, Takai S3, Shimizu N3, Higashi Y2, Kadekawa K3, Majima T3, Saito M2, Yoshimura N3 1. Department of Urology, University of Pittsburgh School of Medicine, Pittsburgh, USA and Department of Pharmacology, Kochi Medical School, Kochi University, Nankoku, Japan, 2. Department of Pharmacology, Kochi Medical School, Kochi University, Nankoku, Japan, 3. Department of Urology, University of Pittsburgh School of Medicine, Pittsburgh, USA ...
  • ,
The ten rounds of the experiment were aggregated to four stages in order to improve statistical properties of the data and clarity of the results. Employing ten stages, however, leads to identical results with regard to main and interaction effects. For the male participants' contributions, a significant interaction effect (P = 0.042), but no significant main effect for allelic variation (P = 0.403) was found. With regard to beliefs, the main (P = 0.092) and the interaction effect (P = 0.090) ar ...
As a result of cloud computing evolution, the rapid growth of the data center storage has prompted enterprises to develop their own public clouds, which, to name a few, include Amazon Web Services (AWS), Microsoft Azure, IBM SoftLayer etc. These public clouds, however, also come with rental fees, as well as the security risks of sensitive internal data leakage. Therefore, the private cloud can be an alternative. This research focuses on minimizing the difficulties in administering private clouds ...
Clinical practice guidelines (CPGs) serve to transfer results from evidence-based medicine into clinical practice. There is growing interest in clinical decision support systems (CDSS) implementing the guideline recommendations; research on such systems typically considers combinations of workflow languages with knowledge representation formalisms. Here, we report on experience with an OWL-based proof-of-concept implementation of parts of the German S3 guideline for schizophrenia. From the infor ...
If V is a unitary transformation in a Hubert space, the convergence of the sequence of transformations {(l/w)]Cs=o^} t o a projection P has been established by von Neumann in his proof of the quasiergodic hypothesis.! Recently, the question of the existence of mean ergodic theorems in more general spaces than Hubert space has received attention. One is here concerned with a bounded linear transformation V of bound not greater than 1, that is, | V\ g l , defined over a Banach space 33, or more ge ...
Maintaining and supporting the software of an organization is not an easy task, and software maintainers do not currently have access to tools to evaluate strategies for improving the specific activities of software maintenance. This article presents a knowledge-based system which helps in locating best practices in a software maintenance capability maturity model (S3 m). It presents an XML-based usage of the knowledge base to measure the concepts most often employed by software maintainers. The ...
  • ,
  • 2009
Cloud computing is an emerging trend which has progressed to the point of serious adoption in both public and private sector organizations, yet it remains a relatively immature paradigm, one which dictates a revision to the traditional characterization of risk in information technology environments. As a means of an introduction to those changes, this paper offers an overview of the information assurance aspects of cloud computing with a focus on potential security advantages and pitfalls. While ...
We show that if a knot in S3 has nontrivial Alexander polynomial then the fundamental group of its complement has a representation into SL(2, C) whose image contains a free group of rank two. Since the advent of Casson's invariant, one of the intriguing aspects of representations of the fundamental groups of three-dimensional Z-homology spheres is the question of whether the group of every such homology sphere other than S3 has an irreducible representation into SU(2). This is also of considerab ...
Young's early maladaptive schemas questionnaire (YSQ-S3) is used to understand psychological aspects. Objective EMSs were evaluated in patients with migraine. Methods Sixty-five subjects were evaluated using the YSQ-S3 under standard conditions in a room with air conditioning at 22 ± 2°C. The subjects were stratified by morbidity (migraine), gender (male/female) and age (18-29 / 30-39 / 40-55). Controls (without migraine), n = 27 and patients (with migraine), n = 38, men (n = 19) and women ...
  • ,
  • 2011
BUOYANCY FLUX ANGLE 339 climate variability, can influence the air/sea exchange and thereby leave an imprint in the ocean. Likewise, changes in ocean circulation, for example, the intensity of the northward residual circulation in the Southern Ocean (Badin and Williams, 2010), may influence the air/sea temperature difference, and thereby the heat flux and buoyancy flux accordingly. Although B, over a larger part of the ocean area, is dominated by its thermal component (BT), it is the interplay o ...
Entity-based data integration (EBDI) is a form of data integration in which information related to the same real-world entity is collected and merged from different sources. It often happens that not all of the sources will agree on one value for a common attribute. These cases are typically resolved by invoking a rule that will select one of the non-null values presented by the sources. One of the most commonly used selection rules is called the naïve selection operator that chooses the non-nu ...
We consider the case that the solar neutrino deficit is due to the vacuum oscillation. The lepton mass matrices with nearly bi-maximal mixings are needed in order to explain both solar and atmospheric neutrino deficit. A texture with the symmetry of flavour democracy or S3 has been investigated by taking account of the symmetry breaking terms of the charged lepton mass matrix. It is found that predicted mixings can be considerably changed from the neutrino mixings sin 2θ⊙ ≃ 1 and sin 2θatm ...
The rise in popularity of mobile applications creates a growing demand to deliver richer functionality to users executing on mobile devices with limited resources. The availability of cloud computing platforms has made available unlimited and scalable resource pools of computation and storage that can be used to enhance service quality for mobile applications. This paper exploits the observation that using local resources in close proximity to the user, i.e. local clouds, can increase the qualit ...
Imagine if you could combine the power and capabilities of an entire laboratory in the palm of your hand. Advances in microfluidic chip technology promise to integrate and miniaturize multiple lab processes into a single palm-sized device. The advantages of these lab-on-a-chip devices, sometimes also referred to as micro total analysis systems (μTAS), compared with conventional bench-scale systems are numerous and wide ranging and include: less reagent consumption, low manufacturing costs, incr ...
Mode shifting is the technique used at the third generation synchrotron light source ELETTRA to cure Coupled Bunch Instabilities (CBI). Temperature tuning of the RF cavities, based on an analytical prediction algorithm, allows longitudinal stable operating conditions to be obtained. However, once longitudinal stability has been achieved transverse instabilities can be observed, particularly during the energy ramp from 1.0 to 2.0 GeV. There has therefore been the need to extend the flexibility of ...
The largest percentage of MSW in Malaysia is contributed by the state of Selangor, with a 3,923 tons generated daily. Therefore, the aim of this study is to consider the current condition of the open dumps and sanitary landfills in Selangor from an environmental point of view. Moreover, the local authorities of Malaysia prefer to use landfills that have no liners, biogas capture, and many others as a method of getting rid of collected waste. In Malaysia, this is the first time life cycle assessm ...
Recent years have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Security and privacy are among top concerns for the public cloud environments. Towards end-to-end content security, we propose and implement CloudSeal, a scheme for securely sharing and distributing content via the public cloud. CloudSeal ensures the confidentiality of content in the public cloud environments with flexible access control policies for subscribers ...
Cooperative diversity systems with optimal and suboptimal antenna and relay selection have been paid significant attention for more than half a decade. However, optimal antenna and relay selection strategies require global channel state information (CSI), which is a cumbersome process. In this paper, we propose a diversity-optimal and three suboptimal transmit-receive antenna and relay selection strategies, named S1, S2, and S3, for decode-and-forward cooperative relaying systems, equipped with ...
This report gives an overview of secure element integration into Android devices. It focuses on the Open Mobile API as an open interface to access secure elements from Android applications. The overall architecture of the Open Mobile API is described and current Android devices are analyzed with regard to the availability of this API. Moreover, this report summarizes our efforts of reverse engineering the stock ROM of a Samsung Galaxy S3 in order to analyze the integration of the Open Mobile API ...
Traditional information retrieval techniques based on keyword search help to identify a ranked set of relevant documents, which often contains many documents in the top ranks that do not meet the user's intention. By considering the semantics of the keywords and their relationships, both precision and recall can be improved. Using an ontology and mapping keywords to entities/concepts and identifying the relationship between them that the user is interested in, allows for retrieving documents tha ...
  • ,
Supplementary Text 3 (Text S3): Discussion of potential polymorphism of MHC class II genes in selected teleosts and comparison with previous studies In the below paragraphs the MHC class II sequence findings in the present study are discussed in relation to possible polymorphism and compared with previous reports on the investigated teleost species. For figures and gene nomenclature we refer to the main text (e.g. Fig. 2) and to other supplementary files. For literature references see at the end ...