PDF Archive search engine
Last database update: 08 December at 01:32 - Around 76000 files indexed.

Show results per page

Results for «endpoint»:

Total: 49 results - 0.031 seconds

Thujone RTP 100%

No significant dose–response relationship was detected for any endpoint besides mortality and the clonic and tonic seizures during clinical observation (see summary in Tables 2 and 3).


plasma alzheimer 94%



v15n4S 57Revisiting 93%

Results in the stratified analysis showed that the higher dose of bevacizumab of 15 mg/kg every 3 weeks significantly prolonged PFS, the primary endpoint, when combined with docetaxel compared with docetaxel plus placebo (median, 10.0 vs.


Lab 5 - Titrations Fall 2015(1) 93%

In this experiment you will learn to perform a titration, select suitable indicator, detect an endpoint, and determine the amount of active ingredient in the antacid tablet.


shortestpath 92%

The edges whose one endpoint is vertex j and the other is in V \ S.


JDIT-2015-0428-016 89%

SIR-Spheres Radioisotope Isotope location β emission (MeV) ϒ emission Matrix material Density (g/mL) Av Diameter (μm) Number of particles (range) Bq per sphere Embolic effect Available activity (GBq) Shelf life Endpoint TheraSphere 90 Y Attached to surface Incorporated into glass matrix 2.28 (100%) None Resin Glass 1.6 [15] 3.2 [15] 32±10 [15] 25±10 [15] 30-60 x106 [16] 3-8 x 106 [16] 50 [16] 2500 [16] Mild-moderate Mild 3 3, 5, 7, 10, 15, 20 24 hours 12 days Target Activity/stasis Target Dose Table 1.


resume 89%

Endpoint Protection Suite and Malwarebytes Anti-Malware, as well as education regarding the latest threats.


B. Page ECPA & Modern Comms 81%

fail over capabilities exist because the packet In addition to the ECPA, the post 9/11 USA- switched networks are able to use multiple paths to Patriot Act and its amendments to the Foreign reach an endpoint.


Protocol Certolizumab Pegol for IC FDA changes 78%

Most trials in IC/BPS use a patient-reported global response assessment (GRA) such as “Compared to when you began this trial, how would you rate your IC symptoms now?” as the primary endpoint.52,53 The O'Leary-Sant Interstitial Cystitis Symptom Index and Problem Index (OSPI) questionnaire evaluates overall symptoms in IC/BPS patients.54 The OSPI results confirm the clinical diagnosis of IC/BPS and establish the severity of the participants IC/BPS baseline symptoms.


appveyor 74%

A aplicação criada tem apenas um endpoint para exemplificar o resultado final.


bodies invisible 69%

¯ is A semi-infinite broken line l ⊂ Rd \ B with the endpoint at O ∈ Rd \ B called a billiard trajectory emanating from O, if the endpoints of its segments (except for O) are regular points of the body boundary ∂B and the outer normal to ∂B at any such point is the bisector of the angle formed by the segments adjoining the point.


5 modi in cui Cisco sta trasformando il video 65%

Viene adottata sempre più di frequente e la domanda di endpoint video economici e facili da usare cresce vertiginosamente per qualsiasi postazione di lavoro:


Puppy Pile FAQ’s 62%

But there is a lot of real estate in between “firm handshake” and “oral or anal?” Many men of all orientations enjoy hugging, cuddling, being tender and physical with each other without the expectation of explicit sexual contact as an endpoint.


Full-Disclosure 62%

“The NSA also devotes considerable resources to attacking endpoint computers.


Phoenix Building Recovery brochure artwork (1) 57%

In that they defined recovery as a process of ‘’voluntary sustained control over substance misuse which maximises health and wellbeing and participation in the rights roles and responsibilities of society’’ ‘’voluntary sustained control over substance misuse which maximises health and wellbeing and participation in the rights roles and responsibilities of society’’ ‘’The concept of recovery as a process, rather than recovery as an end-point is important as it may not have an endpoint.



+39 3476133225 But if more people try to combine these feautures for scientifics approaches, for Computer Science or mathematical purpouse etc nobody thinks that 3 law of asimov rules says that “A robot must protect its own existence as long as such protection does not conflict with the First or Second Laws” , so we can use this law to create an advanced deep security systems that combine Active Defence solutions , Endpoint Protection and all feautures about Artificial Intelligence studies together on the same enviroment .


hitachi-id-password-manager 54%

Windows, NetWare, Samba, NAS appliances Database Oracle, Sybase, SQL Server, DB2/UDB Unix Linux, Solaris, AIX, HP-US with passwd, shadow, TCB, Kerberos, NIS or NIS+ Mainframes/Mini z/OS with RACF, TopSecret or ACF/2, iSeries, Scripts for VM/ESA, Unisys, Siemens, OpenVMS, Tandem Application Oracle eBiz, PeopleSoft, SAP R/3, JDE and more Networking Network devices and VPNs via AD, LDAP, SSH Flexible Agents API, SSH, Web service, Browser emulation, Telnet, TN3270, TN5250, HTTP(S), SQL injection, LDAP attributes and command-line Cloud/SaaS WebEx Connect, Google Apps,, UltiPro HR, Office 365, Cybershift Full Disk Encryption McAfee Endpoint Encryption, Check Point Full Disk Encryption, PGP Whole Disk Encryption Authentication Technology RSA SecurID, ActivIdentity ActivClient Incident Management Integrations Automatically create, update and close tickets on: