Results 61 to 70 of about 1,736,692 (287)
Security analysis of JXME-Proxyless version [PDF]
JXME es la especificación de JXTA para dispositivos móviles con J2ME. Hay dos versiones diferentes de la aplicación JXME disponibles, cada una específica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades.
Arnedo Moreno, Joan +2 more
core
Trabajar para pacientes con enfermedades raras, de baja prevalencia y complejas: share, care, cure [PDF]
El ISBN corresponde a la versión electrónica del documentoCada año, se diagnostica una enfermedad rara a medio millón de europeos. Ningún país puede afrontar este reto en solitario.
Comisión Europea. Dirección General de Salud y Seguridad Alimentaria
core +1 more source
ABSTRACT Water security in tropical regions faces escalating pressures from climate change, land‐use shifts, and population growth. We conducted a bibliometric review of 1146 peer‐reviewed articles (1964–2023) on tropical water security. Latent Dirichlet Allocation identified 13 thematic topics and their evolution. Publications rose sharply after 2012,
Karling Fernanda Schuster +3 more
wiley +1 more source
Estudio sobre demoras de calificación en la provincia de Cáceres en el periodo 2008-2013
Se presentan en este trabajo los datos extraídos de análisis de los expediente de IT (incapacidad temporal) valorados en el EVI (Equipo de valoración de incapacidades) de la Dirección Provincial de Cáceres, tras el agotamiento de los 18 meses ...
José Carlos Fernández Villarroel +4 more
doaj
Security strategies and equilibria in multiobjetives matrix games [PDF]
Multiobjective matrix games have been traditionally analyzed from two different points of view: equiibrium concepts and security strategies. This paper is based upon the idea that both players try to reach equilibrium points playing pairs of security ...
Acosta-Ortega, Faustino, Rafels, Carles
core
The graphical abstract highlights the research collaboration with fishers through interviews to record fishers' knowledge and participatory monitoring, to provide data on small‐scale fisheries in three clear water rivers (Trombetas, Tapajos and Tocantins).
Renato A. M. Silvano +10 more
wiley +1 more source
[EN]In this chapter the reader will find an introduction to the protection of computer systems, a feature that has recently become a very relevant issue for all those open systems, that is, those computer systems that provide their services through a communications network such as, for example, the Inter-net. As for the organization of the chapter, the
openaire +3 more sources
Envenomation caused by the bite of the snake Bothriechis schlegelii. Report of two cases in Colombia
The bite by snakes of the Bothriechis genus is common in certain areas of Colombia such as the Coffee-growing Region. Due to their arboreal habits and defensiveness, these snakes usually bite farmers in their upper limbs and face.
Mario Galofre Ruiz
doaj +1 more source
Seguridad o Inseguridad Social; Los riegos de la Reforma [PDF]
La crisis del modelo económico y del tipo d Estado, que afectó a los países latinoamericanos durante los años ochenta, generó primero políticas de ajuste y estabilización y luego una reestructuración profunda de las economías, las sociedades y el Estado.
Osorio Paz, Saúl +1 more
core
ABSTRACT Psychedelic interventions are not publicly available through Canada's healthcare system. Despite growing scientific evidence, public interest, and efforts to expand access to psychedelic therapies for end‐of‐life psychological suffering, Canadian policies remain restrictive.
Sarah Kratina +4 more
wiley +1 more source

