Results 21 to 30 of about 5,550,853 (286)
Performance analysis of feedback-free collision resolution NDMA protocol [PDF]
To support communications of a large number of deployed devices while guaranteeing limited signaling load, low energy consumption, and high reliability, future cellular systems require efficient random access protocols.
Agustín de Dios, Adrián +3 more
core +2 more sources
Processing human urine and ureteral stents for 16S rRNA amplicon sequencing
Summary: Ureteral stents are commonly used medical devices that harbor a unique and patient-specific microbial community. This protocol describes an optimized procedure for high-quality DNA extraction from both urine and ureteral stent samples for the ...
Kait F. Al, Jeremy P. Burton
doaj +1 more source
Trust in Crowds: probabilistic behaviour in anonymity protocols [PDF]
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either ‘honest’ or ‘corrupted’. This paper generalises this analysis so that each member is assumed to maliciously disclose the identity of other nodes with a ...
A. Serjantov +18 more
core +1 more source
The literature suggests that product and product-service system (PSS) design problems are characteristically different. However, there is limited empirical evidence to suggest that the design cognition specific to the respective design activities is ...
Abhijna Neramballi +2 more
doaj +1 more source
Background Meta-analyses are on top of the evidence-based medicine pyramid, yet many of them are not completed after they are begun. Many factors impacting the publication of meta-analysis works have been discussed, and their association with publication
Le Huu Nhat Minh +12 more
doaj +1 more source
Up-link performance of the DQRUMA MAC protocol in a realistic indoor environment for W-ATM networks [PDF]
This paper evaluates by simulation the performance of the distributed queuing request update multiple access (DQRUMA) MAC protocol in a realistic indoor environment. This protocol has been simulated in conjunction with a type-II hybrid-ARQ protocol based
Olmos Bonafé, Juan José +1 more
core +1 more source
Holistic analysis of mix protocols [PDF]
Security protocols are often analysed in isolation as academic challenges. However, the real world can require various combinations of them, such as a certified email protocol executed over a resilient channel, or the key registration protocol to precede the purchase protocols of Secure Electronic Transactions (SET).
BELLA, Giampaolo +2 more
openaire +3 more sources
Investigating the structural patterns and pragmatic functions of compliments made by Iranian EFL learners [PDF]
This study aims to delve into the unobservable dimensions of deciding and acting in a pragmatically significant speech event. Utilizing a Discourse Completion Test questionnaire, it seeks to find out the structure and pragmatic functions that lie behind ...
Zia Tajeddin, Elham Yazdanmehr
doaj
Individual differences in cognitive abilities and skills can predict normatively superior and logically consistent judgments and decisions. The current experiment investigates the processes that mediate individual differences in risky choices.
Edward T. Cokely, Colleen M. Kelley
doaj +1 more source
Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing [PDF]
In this paper, we propose a privacy preserving distributed clustering protocol for horizontally partitioned data based on a very efficient homomorphic additive secret sharing scheme.
Savas, Erkay, Savaş, Erkay
core

