Results 61 to 70 of about 8,618,364 (391)
Pendulummanagement in secure services [PDF]
Tilt ([2003][1]) defends himself clearly against the criticisms of Drs Exworthy & Gunn ([2003][2]). However, he does not emphasise the extent to which they have misrepresented aspects of the Tilt Report ([Tilt et al , 2000][3]).
openaire +3 more sources
Abstract Purpose Breast cancer is a neoplastic disease with high prevalence among women. Radiotherapy is one of the principal treatment modalities for this disease, but it poses significant challenges. This study aimed to compare and evaluate the technical and dosimetric performance of conventional C‐arm linac systems and a new design, Halcyon, in the ...
Mustafa Çağlar+8 more
wiley +1 more source
Security Issues in Service Composition [PDF]
We use a distributed, enriched λ-calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on each other's behaviour. Then, service interaction results in a call-by-property mechanism, that matches the client requests with service's.
BARTOLETTI, MASSIMO+2 more
openaire +4 more sources
Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan+6 more
wiley +1 more source
В статье разработано вычислительно эффективное алгоритмическое решение задачи оптимальной нелинейной фильтрации оценок информационного воздействия в обобщенной стохастической модели информационного противоборства.
Ivan Polansky, Kirill Loginov
doaj +1 more source
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services [PDF]
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources ...
Bolzoni, D., Eck, P.A.T., Su, X.
core +3 more sources
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho+8 more
wiley +1 more source
Expressing Veracity Reserve in the Secret Service Records of the Polish People’s Republic and the People’s Republic of Bulgaria (on the Example of the CHS Bolek and CHS Sabina Files) The analysis of the language of the security service employees in ...
Julia Mazurkiewicz-Sułkowska
doaj +1 more source
Patients' advocacy: the development of a service at the State Hospital, Carstairs, Scotland [PDF]
Advocacy is part of the process of empowering patients and involving them in the development of services. This paper describes the development of an advocacy service in the State Hospital at Carstairs and explores the issues involved in advocacy in a ...
Jacqueline M. Atkinson+2 more
core +1 more source
Water Security and Services in the Caribbean [PDF]
The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being.
openaire +1 more source