Results 31 to 40 of about 464,149 (355)

Escalating The War On SPAM Through Practical POW Exchange [PDF]

open access: yes, 2007
Proof-of-work (POW) schemes have been proposed in the past. One prominent system is HASHCASH (Back, 2002) which uses cryptographic puzzles . However, work by Laurie and Clayton (2004) has shown that for a uniform proof-of-work scheme on email to have an ...
Gardner-Stephen, Paul
core   +2 more sources

Real-World Patient Experience on the Path to Diagnosis of Ankylosing Spondylitis

open access: yesRheumatology and Therapy, 2019
Introduction We describe the journey to diagnosis of ankylosing spondylitis (AS) from the patient perspective and examine differences in this journey by sex.
Alexis Ogdie   +9 more
doaj   +1 more source

International consensus (ICON) on treatment of Ménière's disease [PDF]

open access: yes, 2018
Objective: To present the international consensus for recommendations for Ménière's disease (MD) treatment. Methods: Based on a literature review and report of 4 experts from 4 continents, the recommendations have been presented during the 21st IFOS ...
Barbara M   +5 more
core   +1 more source

Bow-Tie Microstrip Antenna Design [PDF]

open access: yes, 2005
In this paper, the bow-tie microstrip antennas have been designed with two different angles of 40° and 80°. An investigaton on the effect of the angle to the return loss and radiation patterns had been carried out.
Abdul Aziz, M. Z. A.   +2 more
core   +1 more source

Generalized Kruithof approach for traffic matrix estimation [PDF]

open access: yes, 2006
[Abstract]: In this paper, the traffic matrix estimation problem is formulated as an nonlinear optimization problem based on the generalized Kruithof approach which uses the Kullback distance to measure the probabilistic distance between two traffic ...
Eum, Suyong   +2 more
core   +1 more source

The Neue Nationalgalerie by Mies van der Rohe between Preservation and Minimal Improvement [PDF]

open access: yes, 2020
The NeueNationalgalerie (1968) is considered an icon of the 20th century and part of the legacy of Mies van der Rohe. Almost 50 years after its construction the building showed some physiological decay; however, it has been considered obsolete due to the
Canziani, Andrea, Di Resta, Sara
core   +1 more source

Is Iconic Memory Iconic?

open access: yesPhilosophy and Phenomenological Research, 2019
Short‐term memory in vision is typically thought to divide into at least two memory stores: a short, fragile, high‐capacity store known as iconic memory, and a longer, durable, capacity‐limited store known as visual working memory (VWM). This paper argues that iconic memory stores icons, i.e., image‐like perceptual representations.
openaire   +1 more source

Clinical characteristics and burden of illness in patients with hereditary angioedema: findings from a multinational patient survey

open access: yesOrphanet Journal of Rare Diseases, 2021
Background Hereditary angioedema (HAE) is a rare, debilitating, genetic disease characterized by unpredictable, recurrent, and potentially fatal swelling of the skin and mucous membranes.
Joan Mendivil   +8 more
doaj   +1 more source

Improving Malware Detection Accuracy by Extracting Icon Information

open access: yes, 2017
Detecting PE malware files is now commonly approached using statistical and machine learning models. While these models commonly use features extracted from the structure of PE files, we propose that icons from these files can also help better predict ...
Akhavan-Masouleh, Sepehr   +2 more
core   +1 more source

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]

open access: yes, 2012
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy