Results 1 - 10
of
12,260
An Improved In Situ and Satellite SST Analysis for Climate
- J Clim 15:1609–1625. doi
, 2002
"... A weekly 18 spatial resolution optimum interpolation (OI) sea surface temperature (SST) analysis has been produced at the National Oceanic and Atmospheric Administration (NOAA) using both in situ and satellite data from November 1981 to the present. The weekly product has been available since 1993 a ..."
Abstract
-
Cited by 391 (12 self)
- Add to MetaCart
A weekly 18 spatial resolution optimum interpolation (OI) sea surface temperature (SST) analysis has been produced at the National Oceanic and Atmospheric Administration (NOAA) using both in situ and satellite data from November 1981 to the present. The weekly product has been available since 1993
The 1999 DARPA off-line intrusion detection evaluation
- Computer Networks
, 2000
"... Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government site containing hundreds of users on thousands of hosts. More than 200 instances of 58 attack types were launched again ..."
Abstract
-
Cited by 205 (9 self)
- Add to MetaCart
against victim UNIX and Windows NT hosts in three weeks of training data and two weeks of test data. False alarm rates were low (less than 10 per day). Best detection was provided by network-based systems for old probe and old denialof-service (DoS) attacks and by host-based systems for Solaris user
Parental employment and child cognitive development
- Journal of Human Resources
, 2004
"... This study investigates how parental employment affects child cognitive development. The results indicate that maternal labor supply during the first three years of the child's life has a small negative effect on the predicted verbal ability of 3 and 4 year olds and a larger detrimental impact ..."
Abstract
-
Cited by 200 (5 self)
- Add to MetaCart
on the reading and mathematics achievement of 5 and 6 year olds – working an extra 20 hours per week is anticipated to reduce test scores from the median to the 49 th, 46 th, and 47 th percentiles respectively. Job-holding during the second and third years has particularly deleterious consequences if the mother
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
- in Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, 2000
"... A intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site containing 100’s of users on 1000’s of hosts. More than 300 instances of 38 different automated attacks were launched against victim UNIX hosts in seven weeks of training data ..."
Abstract
-
Cited by 165 (3 self)
- Add to MetaCart
and two weeks of test data. Six research groups participated in a blind evaluation and results were analyzed for probe, denialof-service (DoS), remote-to-local (R2L), and user to root (U2R) attacks. The best systems detected old attacks included in the training data, at moderate detection rates ranging
Infant imitation after a 1-week delay: Long-term memory for novel acts and multiple stimuli
- Developmental Psychology
, 1988
"... Deferred imitation after a l-week delay was examined in 14-month-old infants. Six actions, each using a different object, were demonstrated to each infant. One of the six actions was a novel behavior that had a zero probability of occurrence in spontaneous play. In the imitation condition, infants o ..."
Abstract
-
Cited by 117 (28 self)
- Add to MetaCart
Deferred imitation after a l-week delay was examined in 14-month-old infants. Six actions, each using a different object, were demonstrated to each infant. One of the six actions was a novel behavior that had a zero probability of occurrence in spontaneous play. In the imitation condition, infants
Self-securing Storage: Protecting Data in Compromised Systems
- SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
, 2000
"... Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep old versions of data for a window of time, regardless of the commands received from potentially comp ..."
Abstract
-
Cited by 148 (19 self)
- Add to MetaCart
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep old versions of data for a window of time, regardless of the commands received from potentially
THREE-WEEK –OLD PIGS
"... Porcine reproductive and respiratory syndrome (PRRS)1 is disease of swine causing late-term reproductive failure and severe pneumonia in neonatal pigs. The syndrome is caused by an RNA virus referred to as PRRS virus (PRRSV), which is ..."
Abstract
- Add to MetaCart
Porcine reproductive and respiratory syndrome (PRRS)1 is disease of swine causing late-term reproductive failure and severe pneumonia in neonatal pigs. The syndrome is caused by an RNA virus referred to as PRRS virus (PRRSV), which is
Decomposer biomass in the rhizosphere to assess rhizodeposition
- Oikos
, 2007
"... Quantification of the organic carbon released from plant roots is a challenge. These compounds of rhizodeposition are quickly transformed into CO2 and eventually bacterial biomass to be consumed by bacterivores (protozoa and nematodes). Microbes stimulate rhizodeposition several-fold so assays under ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
under sterile conditions give an unrealistic value. Quantifying bacterial production from 3H-thymidine incorporation falls short in the rhizosphere and the use of isotopes does not allow clear distinction between labeled CO2 released from roots or microbes. We reduced rhizodeposition in 35 week old
Inductive analysis of the internet protocol TLS
- ACM Trans. Inf. Syst. Secur
, 1999
"... Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle. Proofs are based on higher-order logic and make no assumptions concerning beliefs or flniteness. All the obvious securi ..."
Abstract
-
Cited by 131 (16 self)
- Add to MetaCart
security goals can be proved; session resumption appears to be secure even if old session keys have been compromised. The proofs suggest minor changes to simplify the analysis. TLS, even at an abstract level, is much more complicated than most protocols that researchers have verifled. Session keys
The specificity of environmental influence: Socioeconomic status affects early vocabulary development via maternal speech
- Child Development
, 2003
"... The hypothesis was tested that children whose families differ in socioeconomic status (SES) differ in their rates of productive vocabulary development because they have different language-learning experiences. Naturalistic interaction between 33 high-SES and 30 mid-SES mothers and their 2-year-old c ..."
Abstract
-
Cited by 128 (1 self)
- Add to MetaCart
The hypothesis was tested that children whose families differ in socioeconomic status (SES) differ in their rates of productive vocabulary development because they have different language-learning experiences. Naturalistic interaction between 33 high-SES and 30 mid-SES mothers and their 2-year-old
Results 1 - 10
of
12,260