Results 21 to 30 of about 3,621,508 (286)
Craniosynostosis: Esthetic protocol in open technique
The past two decades have seen advances relative to the treatment of patients with craniosynostosis in the areas of resorbable fixation, imaging, and both intraoperative and perioperative management. The purpose of this study is to present open cranial vault reshaping techniques and anesthetic protocol used at Louisiana State University Health ...
Ghali, Ghali E., Zakhary, George
openaire +3 more sources
Improved Soundness for QMA with Multiple Provers [PDF]
We present three contributions to the understanding of QMA with multiple provers: 1) We give a tight soundness analysis of the protocol of [Blier and Tapp, ICQNM '09], yielding a soundness gap Omega(1/N^2).
Chiesa, Alessandro, Forbes, Michael A.
core +1 more source
In this correspondence, we, co-authors and collaborators involved in the Towards Health Equity and Transformative Action on tribal health (THETA) study respond to a recent article published in Wellcome Open Research titled Correspondence article on the ...
Yogish Channabasappa +7 more
doaj +1 more source
Addressing interoperability in open hypermedia: the design of the open hypermedia protocol [PDF]
Abstract Early hypertext systems were monolithic and closed, but newer systems tend to be open, distributed, and support collaboration. While this development has resulted in increased openness and flexibility, integration or adaptation of various different tools (such as content editors, viewers, services, or even other link servers) has remained a ...
Reich, Seigfied +7 more
openaire +4 more sources
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar +3 more
core +4 more sources
Toward Open-Set Face Recognition
Much research has been conducted on both face identification and face verification, with greater focus on the latter. Research on face identification has mostly focused on using closed-set protocols, which assume that all probe images used in evaluation ...
Boult, Terrance E. +3 more
core +1 more source
Elevated Plus Maze Test to Assess Anxiety-like Behavior in the Mouse
The elevated plus maze task is a simple method to assess anxiety-like behaviors in rodents. This version describes the procedure used in mice. However, the protocol may also be applied to rats, considering a proportionally larger apparatus (arms: 10 x 50
Luciana Leo, Fabricio Pamplona
doaj +1 more source
An In-Depth Study on Open-Set Camera Model Identification
Camera model identification refers to the problem of linking a picture to the camera model used to shoot it. In this paper, as this might be an enabling factor in different forensic applications to single out possible suspects (e.g., detecting the author
Pedro Ribeiro Mendes Junior +4 more
doaj +1 more source
Perancangan Jaringan Voice Over Internet Protokol (Voip) Menggunakan Platform Asterisknow
Communication is an important stage to support the running of a work program, without good communication it can cause misunderstandings between the two parties, the importance of the role of communication means several companies are growing rapidly in ...
Ahmad Fauzi +2 more
doaj +1 more source

