Results 41 to 50 of about 3,096,143 (286)
Exposing and harvesting metadata using the OAI metadata harvesting protocol: A tutorial [PDF]
In this article I outline the ideas behind the Open Archives Initiative metadata harvesting protocol (OAIMH), and attempt to clarify some common misconceptions. I then consider how the OAIMH protocol can be used to expose and harvest metadata.
Warner, Simeon
core +1 more source
A posteriori metadata from automated provenance tracking: Integration of AiiDA and TCOD
In order to make results of computational scientific research findable, accessible, interoperable and re-usable, it is necessary to decorate them with standardised metadata. However, there are a number of technical and practical challenges that make this
Cepellotti, Andrea +5 more
core +1 more source
Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks [PDF]
—Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes all the nodes in the network are
Alocious, Chaminda +2 more
core +2 more sources
ABSTRACT Background While Wilms tumor (WT) typically has a favorable prognosis, relapsed cases—especially those with high‐risk histology—remain therapeutically challenging after intensive frontline therapy. The combination of vincristine and irinotecan has demonstrated activity in pediatric solid tumors, and pazopanib, a multi‐targeted tyrosine kinase ...
Maria Debora De Pasquale +6 more
wiley +1 more source
Building flexible groupware through open protocols [PDF]
This paper presents a technical approach to building flexible groupware applications. Flexibility provides the promise of personalizable groupware, allowing different groups to work with the system in diverse ways which best suit the group’s own needs. An implementation technique called open protocols is described, which is a variation of client/server
Mark Roseman, Saul Greenberg
openaire +1 more source
Compiling symbolic attacks to protocol implementation tests
Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the ...
Ghabri, Hatem +2 more
core +4 more sources
Xstream-x264: Real-time H.264 streaming with cross-layer integration [PDF]
We present Xstream-x264: a real-time cross-layer video streaming technique implemented within a well known open-source H.264 video encoder tool x264.
Boreli, Roksana +2 more
core +2 more sources
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein +3 more
wiley +1 more source
Summary: We describe a modified BaseScope™ Assay protocol (ACDBio) for RNA in situ hybridization on fixed-frozen human brain tissue. The original protocol caused tissue detachment due to harsh tissue pre-treatment.
M. Carla Carisì +3 more
doaj +1 more source

