Results 151 to 160 of about 165,185 (180)
Some of the next articles are maybe not open access.
International Journal of Data Warehousing and Mining, 2013
Updates on an operational database bring forth the challenge of keeping the frequent itemsets up-to-date without re-running the itemset mining algorithms. Studies on dynamic itemset mining, which is the solution to such an update problem, have to address some challenges as handling i) updates without re-running the base algorithm, ii) changes in the ...
Oguz D., Yildiz B., Ergenc B.
openaire +4 more sources
Updates on an operational database bring forth the challenge of keeping the frequent itemsets up-to-date without re-running the itemset mining algorithms. Studies on dynamic itemset mining, which is the solution to such an update problem, have to address some challenges as handling i) updates without re-running the base algorithm, ii) changes in the ...
Oguz D., Yildiz B., Ergenc B.
openaire +4 more sources
1993
Amplification of DNA may be necessary to increase the quantity of sample available for profiling, to reduce the analysis time, or to produce probes for the hybridization process (Higuchi 1989, Li 1988, Marx 1988, Mullis 1990, Paabo 1989, Saiki 1986).
openaire +1 more source
Amplification of DNA may be necessary to increase the quantity of sample available for profiling, to reduce the analysis time, or to produce probes for the hybridization process (Higuchi 1989, Li 1988, Marx 1988, Mullis 1990, Paabo 1989, Saiki 1986).
openaire +1 more source
Bromo-DMA: The Australasian Hallucinogen?
Australian & New Zealand Journal of Psychiatry, 1983If the frequency of seizures by police of hallucinogens reflects the frequency with which various hallucinogens are ingested in Australasia, most toxic states resulting from hallucinogen abuse are due to Bromo-DMA and not to LSD as is commonly reported by the subjects. Two cases of intoxication with the new hallucinogen, Bromo-DMA, are reported.
N, Buhrich, G, Morris, G, Cook
openaire +2 more sources
2013
Attackers constantly explore ways to camouflage illicit activities against computer platforms. Stealthy attacks are required in industrial espionage and also by criminals stealing banking credentials. Modern computers contain dedicated hardware such as network and graphics cards. Such devices implement independent execution environments but have direct
Patrick Stewin, Iurii Bystrov
openaire +1 more source
Attackers constantly explore ways to camouflage illicit activities against computer platforms. Stealthy attacks are required in industrial espionage and also by criminals stealing banking credentials. Modern computers contain dedicated hardware such as network and graphics cards. Such devices implement independent execution environments but have direct
Patrick Stewin, Iurii Bystrov
openaire +1 more source

