Results 201 to 210 of about 36,873 (244)
A dual-center retrospective evaluation of 204 blood or plasma transfusions in 169 camelids. [PDF]
Mullins CR +3 more
europepmc +1 more source
Across deserts and Andes: a genetic exploration of GlyCam-1 in domestic camelids. [PDF]
Letaief N +8 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 2019 ACM Southeast Conference, 2019
Developing cyber ranges for cybersecurity penetration testing and capture-the-flag challenges is normally a time-consuming process. A good cyber range challenges practitioners to find obscure paths to break into a system. The cyber range should encourage a "graph thinking" mindset, in which the attacker approaches the challenge from a variety of ...
Joshua Eckroth +3 more
+4 more sources
Developing cyber ranges for cybersecurity penetration testing and capture-the-flag challenges is normally a time-consuming process. A good cyber range challenges practitioners to find obscure paths to break into a system. The cyber range should encourage a "graph thinking" mindset, in which the attacker approaches the challenge from a variety of ...
Joshua Eckroth +3 more
+4 more sources
Proceedings of the 2nd ACM workshop on Information credibility on the web, 2008
Internet users face challenges in evaluating the validity of online information. Such evaluation is not adequately supported by current tools; we outline some of the shortcomings of these tools, including centralization, lack of automation, and lack of user-centrism.
Jeff King +3 more
openaire +1 more source
Internet users face challenges in evaluating the validity of online information. Such evaluation is not adequately supported by current tools; we outline some of the shortcomings of these tools, including centralization, lack of automation, and lack of user-centrism.
Jeff King +3 more
openaire +1 more source
Proceedings of the 14th ACM conference on Computer and communications security, 2007
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them with, and too many administrative domains with incompatible roots of trust.
Chris Lesniewski-Laas +4 more
openaire +1 more source
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them with, and too many administrative domains with incompatible roots of trust.
Chris Lesniewski-Laas +4 more
openaire +1 more source
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015
In enterprise networks, policies (e.g., QoS or security) are often defined based on the categorization of hosts along dimensions such as the organizational role of the host (faculty vs. student), and department (engineering vs. sales). While current best practices (VLANs) help when hosts are categorized along a single dimension, policy may often need ...
Nanxi Kang +3 more
openaire +1 more source
In enterprise networks, policies (e.g., QoS or security) are often defined based on the categorization of hosts along dimensions such as the organizational role of the host (faculty vs. student), and department (engineering vs. sales). While current best practices (VLANs) help when hosts are categorized along a single dimension, policy may often need ...
Nanxi Kang +3 more
openaire +1 more source
2020
The chapter analyses alpaca (Vicugna pacos) meat production and consumption in Peru. The analysis highlights what affects alpaca meat consumption, drawing from exploratory studies in the Andean high zone of Arequipa, Puno, and Cusco. The reasons that are behind alpaca meat consumption decisions are anthropological aspects related to historical and ...
Yezelia Danira Caceres +2 more
openaire +1 more source
The chapter analyses alpaca (Vicugna pacos) meat production and consumption in Peru. The analysis highlights what affects alpaca meat consumption, drawing from exploratory studies in the Andean high zone of Arequipa, Puno, and Cusco. The reasons that are behind alpaca meat consumption decisions are anthropological aspects related to historical and ...
Yezelia Danira Caceres +2 more
openaire +1 more source
Journal of Veterinary Pharmacology and Therapeutics, 2014
In order to investigate whether exenatide could be used to stimulate glucose clearance and insulin secretion in alpacas without causing colic signs, six healthy adult alpacas were injected once a day with increasing subcutaneous doses. A follow‐up intravenous glucose injection was given to induce hyperglycemia, and serial blood samples were collected ...
C K, Cebra +3 more
openaire +2 more sources
In order to investigate whether exenatide could be used to stimulate glucose clearance and insulin secretion in alpacas without causing colic signs, six healthy adult alpacas were injected once a day with increasing subcutaneous doses. A follow‐up intravenous glucose injection was given to induce hyperglycemia, and serial blood samples were collected ...
C K, Cebra +3 more
openaire +2 more sources

