Results 151 to 160 of about 33,288 (212)

Genomic Characterization of <i>Escherichia coli</i> Isolates from Alpaca Crias (<i>Vicugna pacos</i>) in the Peruvian Highlands: Insights into Functional Diversity and Pathogenicity. [PDF]

open access: yesMicroorganisms
Zapata C   +11 more
europepmc   +1 more source

Mature retroperitoneal cystic teratoma in an adult alpaca: a case report. [PDF]

open access: yesBMC Vet Res
Rosato G   +4 more
europepmc   +1 more source

Home

open access: yes, 2009
Davis, Jennifer
core  

A large language model based pipeline for extracting information from patient complaint and anamnesis in clinical notes for severity assessment. [PDF]

open access: yesSci Rep
Gao H   +12 more
europepmc   +1 more source

A stabilized MERS-CoV spike ferritin nanoparticle vaccine elicits robust and protective neutralizing antibody responses. [PDF]

open access: yesNat Commun
Powell AE   +22 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Alpaca

Proceedings of the 2019 ACM Southeast Conference, 2019
Developing cyber ranges for cybersecurity penetration testing and capture-the-flag challenges is normally a time-consuming process. A good cyber range challenges practitioners to find obscure paths to break into a system. The cyber range should encourage a "graph thinking" mindset, in which the attacker approaches the challenge from a variety of ...
Joshua Eckroth   +3 more
  +4 more sources

ALPACA

Proceedings of the 2nd ACM workshop on Information credibility on the web, 2008
Internet users face challenges in evaluating the validity of online information. Such evaluation is not adequately supported by current tools; we outline some of the shortcomings of these tools, including centralization, lack of automation, and lack of user-centrism.
Jeff King   +3 more
openaire   +1 more source

Alpaca

Proceedings of the 14th ACM conference on Computer and communications security, 2007
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them with, and too many administrative domains with incompatible roots of trust.
Chris Lesniewski-Laas   +4 more
openaire   +1 more source

Alpaca

Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015
In enterprise networks, policies (e.g., QoS or security) are often defined based on the categorization of hosts along dimensions such as the organizational role of the host (faculty vs. student), and department (engineering vs. sales). While current best practices (VLANs) help when hosts are categorized along a single dimension, policy may often need ...
Nanxi Kang   +3 more
openaire   +1 more source

Alpaca Meat

2020
The chapter analyses alpaca (Vicugna pacos) meat production and consumption in Peru. The analysis highlights what affects alpaca meat consumption, drawing from exploratory studies in the Andean high zone of Arequipa, Puno, and Cusco. The reasons that are behind alpaca meat consumption decisions are anthropological aspects related to historical and ...
Yezelia Danira Caceres   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy