Results 161 to 170 of about 4,335 (194)
Endangered Galápagos sea lions and fur seals under the siege of lethal avian flu: a cautionary note on emerging infectious viruses in endemic pinnipeds of the Galápagos Islands. [PDF]
Alava JJ +7 more
europepmc +1 more source
Underwater paddling kinematics and hydrodynamics in a surface swimming duck versus a diving duck.
Csillag H, Ribak G.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services ...
Daniel Hintze +7 more
openaire +1 more source
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services ...
Daniel Hintze +7 more
openaire +1 more source
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers - UbiComp '15, 2015
Nowadays, people own and carry an increasing number of mobile devices, such as smartphones and smartwatches. Since these devices store and provide access to sensitive information, authentication is required to prevent unauthorized access. Widely used mechanisms like PIN and password, however, don't scale well with the growing number of devices and ...
Daniel Hintze +4 more
openaire +1 more source
Nowadays, people own and carry an increasing number of mobile devices, such as smartphones and smartwatches. Since these devices store and provide access to sensitive information, authentication is required to prevent unauthorized access. Widely used mechanisms like PIN and password, however, don't scale well with the growing number of devices and ...
Daniel Hintze +4 more
openaire +1 more source
1952
(Uploaded by Plazi from the Biodiversity Heritage Library) No abstract provided.
openaire +1 more source
(Uploaded by Plazi from the Biodiversity Heritage Library) No abstract provided.
openaire +1 more source
Pharacrocoracidae - Cormorants
1949Bulletin of the Raffles Museum, Singapore, Issue 20, pp.
openaire +1 more source
2013
This chapter focuses on Cormorantpopulation counts for both summer(i.e. breeding) and winter (i.e.migration, winter roosts) seasons. Italso explains differences in the datacollected from undertaking ‘day’versus ‘roost’ counts, gives somedefinitions of the term ‘numbers’,and presents two examples ofhow numerical data can be usedto calculate ‘Cormorant ...
Bregnballe, Thomas +6 more
openaire +1 more source
This chapter focuses on Cormorantpopulation counts for both summer(i.e. breeding) and winter (i.e.migration, winter roosts) seasons. Italso explains differences in the datacollected from undertaking ‘day’versus ‘roost’ counts, gives somedefinitions of the term ‘numbers’,and presents two examples ofhow numerical data can be usedto calculate ‘Cormorant ...
Bregnballe, Thomas +6 more
openaire +1 more source

