Results 21 to 30 of about 5,838,160 (343)

Documenting Greek Indigenous Germplasm of Cornelian Cherry (Cornus mas L.) for Sustainable Utilization: Molecular Authentication, Asexual Propagation, and Phytochemical Evaluation

open access: yesPlants, 2022
Wild-growing Cornelian cherries (Cornus mas L., Cornaceae) are well-known native fruits in Greece since ancient times that are still consumed locally nowadays.
Eleftherios Karapatzak   +13 more
doaj   +1 more source

Adaptive Latency Insensitive Protocols [PDF]

open access: yes, 2007
Latency-insensitive design copes with excessive delays typical of global wires in current and future IC technologies. It achieves its goal via encapsulation of synchronous logic blocks in wrappers that communicate through a latency-insensitive protocol ...
Casu, Mario Roberto, Macchiarulo, Luca
core   +1 more source

Rapid Identification Protocols in bacteria by MALDI-TOF from positive blood cultures. A literature review

open access: yesRevista Peruana de Investigación en Salud, 2023
Objective. To identify protocols for rapid identification of bacteria by MALDI-TOF from positive blood cultures that are as accurate as standardized ones. Methods.
Carolina Cucho-Espinoza   +3 more
doaj   +1 more source

Treatment Protocols

open access: yesThe Journal of the American Dental Association, 1996
The Journal of the American Dental Association 127 (1996) 1456,1458,1460-1456,1458,1460.
Division of Oral   +2 more
openaire   +3 more sources

APTE: An Algorithm for Proving Trace Equivalence [PDF]

open access: yes, 2014
This paper presents APTE, a new tool for automatically proving the security of cryptographic protocols. It focuses on proving trace equivalence between processes, which is crucial for specifying privacy type properties such as anonymity and unlinkability.
B. Blanchet   +5 more
core   +1 more source

Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking [PDF]

open access: yes, 2012
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking
Boyd, Colin   +2 more
core   +2 more sources

Clock/Sleep-Dependent Learning and Memory in Male 3xTg-AD Mice at Advanced Disease Stages and Extrinsic Effects of Huprine X and the Novel Multitarget Agent AVCRI104P3

open access: yesBrain Sciences, 2021
A new hypothesis highlights sleep-dependent learning/memory consolidation and regards the sleep-wake cycle as a modulator of β-amyloid and tau Alzheimer’s disease (AD) pathologies. Sundowning behavior is a common neuropsychiatric symptom (NPS) associated
Lydia Giménez-Llort   +7 more
doaj   +1 more source

Attacking Group Protocols by Refuting Incorrect Inductive Conjectures [PDF]

open access: yes, 2005
Automated tools for finding attacks on flawed security protocols often fail to deal adequately with group protocols. This is because the abstractions made to improve performance on fixed 2 or 3 party protocols either preclude the modelling of group ...
Alan Bundy   +16 more
core   +3 more sources

Distributed Protocols at the Rescue for Trustworthy Online Voting [PDF]

open access: yes, 2017
While online services emerge in all areas of life, the voting procedure in many democracies remains paper-based as the security of current online voting technology is highly disputed. We address the issue of trustworthy online voting protocols and recall
Grumbach, Stéphane, Riemann, Robert
core   +4 more sources

SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials

open access: yesBritish medical journal, 2013
High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate.
A. Chan   +12 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy