Results 41 to 50 of about 676,310 (346)
A Logical Method for Policy Enforcement over Evolving Audit Logs [PDF]
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule. The logic has three features that raise challenges for enforcement -
Datta, Anupam, Garg, Deepak, Jia, Limin
core +2 more sources
The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley +1 more source
Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events
Log files are essential assets for IT engineers engaged in the security of server and computer systems. They provide crucial information for identifying malicious events, conducting cybersecurity incident analyses, performing audits, system maintenance ...
J. D. Morillo Reina +1 more
doaj +1 more source
Outlier detection from ETL Execution trace
Extract, Transform, Load (ETL) is an integral part of Data Warehousing (DW) implementation. The commercial tools that are used for this purpose captures lot of execution trace in form of various log files with plethora of information.
Chakrabarti, Amlan +2 more
core +1 more source
Network topology drives population temporal variability in experimental habitat networks
Habitat patches connected by dispersal pathways form habitat networks. We explored how network topology affects population outcomes in laboratory experiments using a model species (Daphnia carinata). Central habitat nodes in complex lattice networks exhibited lower temporal variability in population sizes, suggesting they support more stable ...
Yiwen Xu +3 more
wiley +1 more source
Treatability of U.S. Environmental Protection Agency Contaminant Candidate List Viruses: Removal of Coxsackievirus and Echovirus using Enhanced Coagulation [PDF]
Enhanced coagulation was evaluated for removal efficacy of coxsackievirus and echovirus (Contaminant Candidate List [CCL] enteroviruses), poliovirus, four potential surrogate bacteriophages, and dissolved organic carbon (DOC).
Abbaszadegan, Morteza +2 more
core +1 more source
occumb: An R package for site occupancy modeling of eDNA metabarcoding data
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley +1 more source
Semantic process mining tools: core building blocks [PDF]
Process mining aims at discovering new knowledge based on information hidden in event logs. Two important enablers for such analysis are powerful process mining techniques and the omnipresence of event logs in today's information systems.
de Medeiros, Ana Karla Alves +2 more
core
Jets in Effective Theory: Summing Phase Space Logs [PDF]
We demonstrate how to resum phase space logarithms in the Sterman-Weinberg (SW) dijet decay rate within the context of Soft Collinear Effective theory (SCET). An operator basis corresponding to two and three jet events is defined in SCET and renormalized.
G. Sterman +3 more
core +2 more sources
This paper is an announcement of the minimal model theory for log surfaces in all characteristics and contains some related results including a simplified proof of the Artin-Keel contraction theorem in the surface case.
Fujino, Osamu, Tanaka, Hiromu
openaire +4 more sources

