Results 321 to 330 of about 327,438 (330)
Some of the next articles are maybe not open access.
A protocol for isolation and culture of mesenchymal stem cells from mouse compact bone
Nature Protocols, 2010Dingdingabc Zhu +2 more
exaly
On Protocol-Independent Data Redundancy Elimination
IEEE Communications Surveys and Tutorials, 2014Nirwan Ansari
exaly
A survey of security techniques for the border gateway protocol (BGP)
IEEE Communications Surveys and Tutorials, 2009exaly
A protocol for data exploration to avoid common statistical problems
Methods in Ecology and Evolution, 2010exaly
An Assessment of Internet of Things Protocols for Resource-Constrained Applications
Dae-Hyeok Mun +2 more
openalex +1 more source
Security analysis of the constrained application protocol in the Internet of Things
Thamer A. Alghamdi +2 more
openalex +1 more source
PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)
2017P. van der Stok, C. Bormann, A. Sehgal
openaire +1 more source
A Passive Interoperability Testing Approach to Constrained Application Protocol
2012Nanxing, Chen, Viho, César
openaire +1 more source
Constrained Application Protocol Profile for Robust Header Compression Framework
2015Koskela, Pekka +3 more
openaire +2 more sources

