Results 21 to 30 of about 5,550,853 (286)

Performance analysis of feedback-free collision resolution NDMA protocol [PDF]

open access: yes, 2018
To support communications of a large number of deployed devices while guaranteeing limited signaling load, low energy consumption, and high reliability, future cellular systems require efficient random access protocols.
Agustín de Dios, Adrián   +3 more
core   +2 more sources

Processing human urine and ureteral stents for 16S rRNA amplicon sequencing

open access: yesSTAR Protocols, 2021
Summary: Ureteral stents are commonly used medical devices that harbor a unique and patient-specific microbial community. This protocol describes an optimized procedure for high-quality DNA extraction from both urine and ureteral stent samples for the ...
Kait F. Al, Jeremy P. Burton
doaj   +1 more source

Trust in Crowds: probabilistic behaviour in anonymity protocols [PDF]

open access: yes, 2010
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either ‘honest’ or ‘corrupted’. This paper generalises this analysis so that each member is assumed to maliciously disclose the identity of other nodes with a ...
A. Serjantov   +18 more
core   +1 more source

Is product-service system designing different from product designing? A cognitive study of experienced product designers

open access: yesDesign Science
The literature suggests that product and product-service system (PSS) design problems are characteristically different. However, there is limited empirical evidence to suggest that the design cognition specific to the respective design activities is ...
Abhijna Neramballi   +2 more
doaj   +1 more source

Factors associated with successful publication for systematic review protocol registration: an analysis of 397 registered protocols

open access: yesSystematic Reviews, 2023
Background Meta-analyses are on top of the evidence-based medicine pyramid, yet many of them are not completed after they are begun. Many factors impacting the publication of meta-analysis works have been discussed, and their association with publication
Le Huu Nhat Minh   +12 more
doaj   +1 more source

Up-link performance of the DQRUMA MAC protocol in a realistic indoor environment for W-ATM networks [PDF]

open access: yes, 2000
This paper evaluates by simulation the performance of the distributed queuing request update multiple access (DQRUMA) MAC protocol in a realistic indoor environment. This protocol has been simulated in conjunction with a type-II hybrid-ARQ protocol based
Olmos Bonafé, Juan José   +1 more
core   +1 more source

Holistic analysis of mix protocols [PDF]

open access: yes2011 7th International Conference on Information Assurance and Security (IAS), 2011
Security protocols are often analysed in isolation as academic challenges. However, the real world can require various combinations of them, such as a certified email protocol executed over a resilient channel, or the key registration protocol to precede the purchase protocols of Secure Electronic Transactions (SET).
BELLA, Giampaolo   +2 more
openaire   +3 more sources

Investigating the structural patterns and pragmatic functions of compliments made by Iranian EFL learners [PDF]

open access: yesJournal of English Language Teaching and Learning, 2013
This study aims to delve into the unobservable dimensions of deciding and acting in a pragmatically significant speech event. Utilizing a Discourse Completion Test questionnaire, it seeks to find out the structure and pragmatic functions that lie behind ...
Zia Tajeddin, Elham Yazdanmehr
doaj  

Cognitive abilities and superior decision making under risk: A protocol analysis and process model evaluation

open access: yesJudgment and Decision Making, 2009
Individual differences in cognitive abilities and skills can predict normatively superior and logically consistent judgments and decisions. The current experiment investigates the processes that mediate individual differences in risky choices.
Edward T. Cokely, Colleen M. Kelley
doaj   +1 more source

Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing [PDF]

open access: yes, 2007
In this paper, we propose a privacy preserving distributed clustering protocol for horizontally partitioned data based on a very efficient homomorphic additive secret sharing scheme.
Savas, Erkay, Savaş, Erkay
core  

Home - About - Disclaimer - Privacy