#### Filter Results:

#### Publication Year

1989

2012

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

Security administration is an uphill task to implement in an enterprise network providing secured corporate services. With the slew of patches being released by Microsoft, HP and other vendors, system administrators require a barrage of tools for analyzing the risk due to these vulnerabilities. In addition to this, criticalities in patching some end hosts… (More)

Security administration is an uphill task to implement in an enterprise network providing secured corporate services. With the slew of patches being released by network component vendors, system administrators require a barrage of tools for analyzing the risk due to vulnerabilities in those components. In addition, criticalities in patching some end hosts… (More)

Let R be an integral domain and let f (X) be a nonzero polynomial in R[X]. The content of f is the ideal c(f) generated by the coefficients of f. The polynomial f (X) is called Gaussian if c(f g) = c(f)c(g) for all g(X) ∈ R[X]. It is well known that if c(f) is an invertible ideal, then f is Gaussian. In this note we prove the converse.

The classical ring of integer-valued polynomials Int(Z) consists of the poly-nomials in Q[X] that map Z into Z. We consider a generalization of integer-valued polynomials where elements of Q[X] act on sets such as rings of algebraic integers or the ring of n × n matrices with entries in Z. The collection of polynomials thus produced is a subring of Int(Z),… (More)

This report surveyed the pharmacologic knowledge of the physician housestaff and intensive care nurses regarding the analgesic and anxiolytic effects of narcotics, benzodiazepines and neuromuscular blockers. The results demonstrated a commonly held misconception that muscular paralysis is a calm and painless state. The authors instituted an educational… (More)

- ‹
- 1
- ›