Results 331 to 340 of about 5,059,786 (358)
Some of the next articles are maybe not open access.

ABY3: A Mixed Protocol Framework for Machine Learning

IACR Cryptology ePrint Archive, 2018
Machine learning is widely used to produce models for a range of applications and is increasingly offered as a service by major technology companies.
Payman Mohassel, Peter Rindal
semanticscholar   +1 more source

Examinations, Protocols, and “Auto” Protocols

2020
How is a clinical need translated into a specific imaging service? This chapter describes how radiology departments may try to satisfy the needs captured in the order by offering a range of services, how the details of those services are specified, and how they are translated into the Current Procedure Terminology (CPT) codes that are necessary for ...
Oleg Pianykh, Daniel Rosenthal
openaire   +2 more sources

Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks

ACM/IEEE International Conference on Mobile Computing and Networking, 2002
An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range.
Yih-Chun Hu, A. Perrig, David B. Johnson
semanticscholar   +1 more source

IARPA Janus Benchmark - C: Face Dataset and Protocol

International Conference on Biometrics, 2018
Although considerable work has been done in recent years to drive the state of the art in facial recognition towards operation on fully unconstrained imagery, research has always been restricted by a lack of datasets in the public domain.
Brianna Maze   +10 more
semanticscholar   +1 more source

X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks

ACM International Conference on Embedded Networked Sensor Systems, 2006
In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as BMAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble ...
Michael Buettner   +3 more
semanticscholar   +1 more source

No S.C.A.R.E. Protocol: A Streamlined Safety Protocol

Journal of the American Academy of Orthopaedic Surgeons, 2020
Introduction: Despite the proven success of anterior cervical surgery (ACS) postoperative issues can arise, with retropharyngeal hematoma (RH) being one of the most feared. A recent USA Today article highlighted the failed management and subsequent death of patients developing RH after ACS.
K. Dan Riew   +5 more
openaire   +3 more sources

Retransmission Protocols

2011
Publisher Summary This chapter describes the operation of the two mechanisms responsible for retransmission handling in LTE, the MAC and RLC sublayers. Retransmission of missing or erroneous data units is handled primarily by the hybrid-ARQ mechanism in the MAC layer, complemented by the retransmission functionality of the RLC protocol.
Johan Sköld   +2 more
openaire   +4 more sources

Statistical Standards for Protocols and Protocol Deviations [PDF]

open access: possible, 1988
Any pharmaceutical company involved in drug research in a major way is likely to develop internal standards for its clinical trial work. This is particularly so as the number of staff increases because of the need to control standards and to maintain consistent approaches.
openaire   +2 more sources

Protocols

2010
Publisher Summary This chapter provides an overview of the main protocols used in the EPS with the aim to give a basic overview of these protocols and their basic properties. The original version of the GTP protocol is what the GSM standards developed to cater to the specific needs such as mobility and bearer management and tunneling of user data ...
Stefan Rommer   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy