Results 11 to 20 of about 3,096,143 (286)
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation.
Ross Sue +3 more
doaj +1 more source
The results of surgical treatment of patients with open abdominal injury
Objective: To study the evolution of approaches to surgical treatment in patients with open abdominal trauma.Material and methods: The results of surgical treatment of 141 patients with open abdominal trauma at the age of 32.6 ± 7.3 years have been ...
G. K. Karipidi +7 more
doaj +1 more source
FairLedger: A Fair Blockchain Protocol for Financial Institutions [PDF]
Financial institutions are currently looking into technologies for permissioned blockchains. A major effort in this direction is Hyperledger, an open source project hosted by the Linux Foundation and backed by a consortium of over a hundred companies.
Keidar, Idit +3 more
core +2 more sources
Implementation of OCPP Protocol for Electric Vehicle Applications [PDF]
The ability of the software and hardware systems to interchange information is a key factor for the success of the electric vehicle industry.
Venkata Pruthvi Thota +3 more
doaj +1 more source
Un environnement formel d'assistance à la modélisation de protocoles [PDF]
The use of protocol design toolkits based on UML profiles has been hampered by the lack of methodological support. Indeed, those toolkits should include an assistant based on patterns and dedicated to driving the designer step by step through a well ...
Apvrille, Ludovic +1 more
core +1 more source
A protocol for working with open-source neuroimaging datasets
Summary: Large, publicly available neuroimaging datasets are becoming increasingly common, but their use presents challenges because of insufficient knowledge of the tool options for data processing and proper data organization.
Corey Horien +7 more
doaj +1 more source
Achieving the physical limits of the bounded-storage model [PDF]
Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol.
Mandayam, Prabha, Wehner, Stephanie
core +2 more sources
Improved Soundness for QMA with Multiple Provers [PDF]
We present three contributions to the understanding of QMA with multiple provers: 1) We give a tight soundness analysis of the protocol of [Blier and Tapp, ICQNM '09], yielding a soundness gap Omega(1/N^2).
Chiesa, Alessandro, Forbes, Michael A.
core +1 more source
Craniosynostosis: Esthetic protocol in open technique
The past two decades have seen advances relative to the treatment of patients with craniosynostosis in the areas of resorbable fixation, imaging, and both intraoperative and perioperative management. The purpose of this study is to present open cranial vault reshaping techniques and anesthetic protocol used at Louisiana State University Health ...
Ghali, Ghali E., Zakhary, George
openaire +3 more sources
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar +3 more
core +4 more sources

