Word: scans
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
...suffering epileptic seizures so severe and unremitting that they could be relieved only by removal of part of her brain. First her brain was mapped by a positron-emission tomography scanner, a machine invented at ucla; then those readings were matched against others provided by a more conventional mri scan...
...girl was wheeled into an operating room at 7:30 on a Thursday morning. Dr. Peacock's team exposed the surface of her brain and applied electrodes to stimulate it and provide yet another map to the diseased areas. Surgeons played the pet scan, the mri and the new data over and over on video monitors; the readings on all three had to match before the cutting away of malfunctioning parts of the child's brain could begin. The incisions were delicate, the atmosphere tense and progress slow. Surgeons relieved one another, while gowned students observed intently and residents stood...
...didn't set out to make headlines or case law. A former furniture mover with an interest in computers, he opened his BBS in 1991 with 12 photos and a single phone line. He worked hard. He regularly put in 16-hour days, sometimes staying up all night to scan new, hard-to-find photos for his collection. At the time of his indictment he was spending $500 a week on fresh material, much of it sent by scouts as far away as Denmark and Brazil. The slogan for his bulletin board came from closer to home, however...
Tuba powered up the engines and made one last scan of his panel. Tonight they would practice intercept maneuvers over the Adriatic Sea with the carrier's F/A-18 Hornets. Rosie grabbed a bar over her instrument panel and tensed every muscle in her body. Launch...
...judging by its advance press, the most dreaded computer program since the Michelangelo virus. SATAN, which is an acronym for Security Administrator Tool for Analyzing Networks, was designed by Farmer and a fellow programmer to help network administrators scan their computers for the technological equivalent of an unlocked back door -- a security hole that could be exploited by unauthorized users looking for a way to break in. By locating the cracks in their computer systems, administrators could patch them before they sprang leaks...