Results 11 to 20 of about 3,096,143 (286)

Protecting intellectual property associated with Canadian academic clinical trials - approaches and impact

open access: yesTrials, 2012
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation.
Ross Sue   +3 more
doaj   +1 more source

The results of surgical treatment of patients with open abdominal injury

open access: yesИнновационная медицина Кубани, 2022
Objective: To study the evolution of approaches to surgical treatment in patients with open abdominal trauma.Material and methods: The results of surgical treatment of 141 patients with open abdominal trauma at the age of 32.6 ± 7.3 years have been ...
G. K. Karipidi   +7 more
doaj   +1 more source

FairLedger: A Fair Blockchain Protocol for Financial Institutions [PDF]

open access: yes, 2019
Financial institutions are currently looking into technologies for permissioned blockchains. A major effort in this direction is Hyperledger, an open source project hosted by the Linux Foundation and backed by a consortium of over a hundred companies.
Keidar, Idit   +3 more
core   +2 more sources

Implementation of OCPP Protocol for Electric Vehicle Applications [PDF]

open access: yesE3S Web of Conferences, 2019
The ability of the software and hardware systems to interchange information is a key factor for the success of the electric vehicle industry.
Venkata Pruthvi Thota   +3 more
doaj   +1 more source

Un environnement formel d'assistance à la modélisation de protocoles [PDF]

open access: yes, 2008
The use of protocol design toolkits based on UML profiles has been hampered by the lack of methodological support. Indeed, those toolkits should include an assistant based on patterns and dedicated to driving the designer step by step through a well ...
Apvrille, Ludovic   +1 more
core   +1 more source

A protocol for working with open-source neuroimaging datasets

open access: yesSTAR Protocols, 2022
Summary: Large, publicly available neuroimaging datasets are becoming increasingly common, but their use presents challenges because of insufficient knowledge of the tool options for data processing and proper data organization.
Corey Horien   +7 more
doaj   +1 more source

Achieving the physical limits of the bounded-storage model [PDF]

open access: yes, 2011
Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol.
Mandayam, Prabha, Wehner, Stephanie
core   +2 more sources

Improved Soundness for QMA with Multiple Provers [PDF]

open access: yes, 2013
We present three contributions to the understanding of QMA with multiple provers: 1) We give a tight soundness analysis of the protocol of [Blier and Tapp, ICQNM '09], yielding a soundness gap Omega(1/N^2).
Chiesa, Alessandro, Forbes, Michael A.
core   +1 more source

Craniosynostosis: Esthetic protocol in open technique

open access: yesAnnals of Maxillofacial Surgery, 2013
The past two decades have seen advances relative to the treatment of patients with craniosynostosis in the areas of resorbable fixation, imaging, and both intraoperative and perioperative management. The purpose of this study is to present open cranial vault reshaping techniques and anesthetic protocol used at Louisiana State University Health ...
Ghali, Ghali E., Zakhary, George
openaire   +3 more sources

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]

open access: yes, 2013
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar   +3 more
core   +4 more sources

Home - About - Disclaimer - Privacy