Results 21 to 30 of about 5,838,160 (343)
Wild-growing Cornelian cherries (Cornus mas L., Cornaceae) are well-known native fruits in Greece since ancient times that are still consumed locally nowadays.
Eleftherios Karapatzak +13 more
doaj +1 more source
Adaptive Latency Insensitive Protocols [PDF]
Latency-insensitive design copes with excessive delays typical of global wires in current and future IC technologies. It achieves its goal via encapsulation of synchronous logic blocks in wrappers that communicate through a latency-insensitive protocol ...
Casu, Mario Roberto, Macchiarulo, Luca
core +1 more source
Objective. To identify protocols for rapid identification of bacteria by MALDI-TOF from positive blood cultures that are as accurate as standardized ones. Methods.
Carolina Cucho-Espinoza +3 more
doaj +1 more source
The Journal of the American Dental Association 127 (1996) 1456,1458,1460-1456,1458,1460.
Division of Oral +2 more
openaire +3 more sources
APTE: An Algorithm for Proving Trace Equivalence [PDF]
This paper presents APTE, a new tool for automatically proving the security of cryptographic protocols. It focuses on proving trace equivalence between processes, which is crucial for specifying privacy type properties such as anonymity and unlinkability.
B. Blanchet +5 more
core +1 more source
Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking [PDF]
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking
Boyd, Colin +2 more
core +2 more sources
A new hypothesis highlights sleep-dependent learning/memory consolidation and regards the sleep-wake cycle as a modulator of β-amyloid and tau Alzheimer’s disease (AD) pathologies. Sundowning behavior is a common neuropsychiatric symptom (NPS) associated
Lydia Giménez-Llort +7 more
doaj +1 more source
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures [PDF]
Automated tools for finding attacks on flawed security protocols often fail to deal adequately with group protocols. This is because the abstractions made to improve performance on fixed 2 or 3 party protocols either preclude the modelling of group ...
Alan Bundy +16 more
core +3 more sources
Distributed Protocols at the Rescue for Trustworthy Online Voting [PDF]
While online services emerge in all areas of life, the voting procedure in many democracies remains paper-based as the security of current online voting technology is highly disputed. We address the issue of trustworthy online voting protocols and recall
Grumbach, Stéphane, Riemann, Robert
core +4 more sources
SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials
High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate.
A. Chan +12 more
semanticscholar +1 more source

