Results 211 to 220 of about 38,350 (274)
Magnetic solid-phase extraction of trace cobalt(II) on iron oxide-hexagonal boron nitride in water and food samples. [PDF]
Soylak M, Ali Mohammed AM, Uzcan F.
europepmc +1 more source
Improving fermentation quality of Sichuan radish paocai through co-inoculation of homo- and heterofermentative lactic acid bacteria. [PDF]
Fan Y, Guo Q.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ACM SIGCOMM Computer Communication Review, 2012
IP spoofing weakens network security and accountability. Although a lot of techniques have been proposed to prevent IP spoofing, most of them are not implemented by device vendors, and the only available anti-spoofing tool in practice is ingress filtering [3].
Bingyang Liu, Jun Bi, Xiaowei Yang
openaire +1 more source
IP spoofing weakens network security and accountability. Although a lot of techniques have been proposed to prevent IP spoofing, most of them are not implemented by device vendors, and the only available anti-spoofing tool in practice is ingress filtering [3].
Bingyang Liu, Jun Bi, Xiaowei Yang
openaire +1 more source
2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), 2021
Function as a Service (FaaS), a form of serverless computing, is one of the recent cloud computing service offerings, which abstracts and automates the management and provisioning of resources, and deployment of applications. It provides powerful abstractions to compose applications as stateless functions and triggers their executions through events ...
Sheshadri K R, J Lakshmi
openaire +1 more source
Function as a Service (FaaS), a form of serverless computing, is one of the recent cloud computing service offerings, which abstracts and automates the management and provisioning of resources, and deployment of applications. It provides powerful abstractions to compose applications as stateless functions and triggers their executions through events ...
Sheshadri K R, J Lakshmi
openaire +1 more source
1997
In June 1995, the FAA developed a "total requirements" estimate for the period FY 97-FY 02 to help explain the difficulty of supporting a dynamic, growing aviation industry under a federal budget picture which projected flat or reduced funding for the agency. The FAA's estimate for the six-year period was $59.3B in budget outlays.
openaire +1 more source
In June 1995, the FAA developed a "total requirements" estimate for the period FY 97-FY 02 to help explain the difficulty of supporting a dynamic, growing aviation industry under a federal budget picture which projected flat or reduced funding for the agency. The FAA's estimate for the six-year period was $59.3B in budget outlays.
openaire +1 more source
2016 Integrated Communications Navigation and Surveillance (ICNS), 2016
ASISP -Aircraft Systems Information Security program NAS level Threat Modeling. Cyber Test Facility. Cyber Research for ATM.
openaire +1 more source
ASISP -Aircraft Systems Information Security program NAS level Threat Modeling. Cyber Test Facility. Cyber Research for ATM.
openaire +1 more source
1966
This Advisory Circular presents general guidance for airport emergency operations planning and is limited to principles which will serve as a guide to writing an adequate emergency plan.
openaire +1 more source
This Advisory Circular presents general guidance for airport emergency operations planning and is limited to principles which will serve as a guide to writing an adequate emergency plan.
openaire +1 more source
AC 65-13: FAA Inspection Authorization Directory
1971This circular announces the availability to the public of the FAA Inspection Authorization Directory, Advisory Circular 65-13.
openaire +1 more source

