Results 111 to 120 of about 40,203 (280)

Cranial Defect Reconstruction With Custom 3D‐Printed Hydroxyapatite Scaffolds Augmented With rhBMP‐2 or Dipyridamole in a Nonhuman Primate Model

open access: yesJournal of Tissue Engineering and Regenerative Medicine, Volume 2026, Issue 1, 2026.
Objective Reconstruction of critical‐sized bone defects, particularly in the cranio‐maxillofacial region, presents unique challenges due to the need for integration with adjacent well‐vascularized tissue and the absence of significant load‐bearing requirements.
Griffin P. Bins   +11 more
wiley   +1 more source

Evaluation and strategies of tolerance to water stress in Paspalum germplasm

open access: yesTropical Grasslands-Forrajes Tropicales, 2017
The evaluation of genetic resources in germplasm banks of Paspalum can contribute to their use in breeding programs and for advanced research in biotechnology.
Cristiana de G. Pezzopane   +5 more
doaj   +1 more source

From BGP to RTT and Beyond: Matching BGP Routing Changes and Network Delay Variations with an Eye on Traceroute Paths

open access: yes, 2013
Many organizations have the mission of assessing the quality of broadband access services offered by Internet Service Providers (ISPs). They deploy network probes that periodically perform network measures towards selected Internet services. By analyzing
Di Battista, Giuseppe   +2 more
core  

Inter-domain routing security mechanism for crossing autonomous system alliance

open access: yesTongxin xuebao, 2014
Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance ...
Ling-jing KONG   +3 more
doaj   +2 more sources

RAPTOR: Routing Attacks on Privacy in Tor

open access: yes, 2015
The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path.
Chiang, Mung   +6 more
core  

Research on Blockchain-Based Inter-Domain Routing Security Enhancement [PDF]

open access: yesJisuanji kexue yu tansuo
The border gateway protocol (BGP) is currently the de facto interdomain routing standard in the Internet, with its security based on the authenticity and integrity of autonomous systems (AS) identities and paths.
WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, MA Zhuo
doaj   +1 more source

The Drug Candidate BGP-15 Delays the Onset of Diastolic Dysfunction in the Goto-Kakizaki Rat Model of Diabetic Cardiomyopathy

open access: yesMolecules, 2019
Background and Aims: Diabetic cardiomyopathy (DCM) is an emerging problem worldwide due to an increase in the incidence of type 2 diabetes. Animal studies have indicated that metformin and pioglitazone can prevent DCM partly by normalizing insulin ...
Mariann Bombicz   +10 more
semanticscholar   +1 more source

Seismic strategy for predicting highly profitable wells in the fractured-vuggy carbonate reservoirs

open access: yesPetroleum Exploration and Development, 2013
Aiming at the problems of “high but unstable production” and low success ratio in highly profitable well prediction of the Ordovician fractured-vuggy carbonate reservoirs of the Tarim Basin, based on their features of small size, huge burial depth and ...
Ping YANG   +4 more
doaj   +1 more source

A Survey of Advanced Border Gateway Protocol Attack Detection Techniques

open access: yesSensors
The Internet’s default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often ...
Ben A. Scott   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy