Results 31 to 40 of about 1,981,488 (283)

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Routing Protection Algorithm Based on Hybrid Software Defined Network [PDF]

open access: yesJisuanji gongcheng, 2020
In order to enable the Software Defined Network(SDN) to cope with the possible situations of single link failure in network,this paper proposes a routing protection algorithm based on hybrid SDN.The routing protection algorithm coping with the single ...
GENG Haijun, ZHANG Wei, YIN Xia
doaj   +1 more source

Truly-Protect: An Efficient VM-Based Software Protection [PDF]

open access: yesIEEE Systems Journal, 2013
We present Truly-Protect that is a software protection method. Previously published protection methods relied solely on obscurity. Rolles proposed a general approach for breaking systems that are based on obscurity. We show that, under certain assumptions, Truly-Protect is resistant not only to Rolles' attack but also to any other attacks that do not ...
Kiperberg, Michael   +3 more
openaire   +2 more sources

U.S. Software Protection: Problems of Trade Secret Estoppel under International and Brazilian Technology Transfer Regimes Note [PDF]

open access: yes, 1984
This note describes the fundamental aspects of software protection and applies the requisites of U.S. trade secret protection to software. After explaining how the UNCTAD and Brazilian transfer of technology regimes apply to software licensing ...
Reidenberg, Joel R.
core   +1 more source

Brief announcement: passive and active attacks on audience response systems using software defined radios [PDF]

open access: yes, 2017
Audience response systems, also known as clickers, are used at many academic institutions to offer active learning environments. Since these systems are used to administer graded assignments, and sometimes even exams, it is crucial to assess their ...
Ewing, Ryan   +3 more
core   +1 more source

DELP Treatment on Vision and Retinal Microcirculation in Patients With Acute Ischemic Stroke: Report of Five Cases and Literature Review

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background The delipid extracorporeal lipoprotein filter from plasma (DELP) treatment can effectively reduce blood lipid, increase blood flow, and improve neurological deficits in patients with acute ischemic stroke (AIS). However, its effect on vision and retinal microcirculation in stroke patients has never been reported.
Ning Li   +9 more
wiley   +1 more source

Compiler protection techniques against software vulnerabilities exploitation

open access: yesТруды Института системного программирования РАН, 2018
Software vulnerabilities are critical for security. All C/C++ programs contain significant amount of vulnerabilities. Some of them can be successfully exploitable by attacker to gain control of the execution flow.
A. R. Nurmukhametov   +3 more
doaj   +1 more source

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

Open-source QSAR models for pKa prediction using multiple machine learning approaches

open access: yesJournal of Cheminformatics, 2019
Background The logarithmic acid dissociation constant pKa reflects the ionization of a chemical, which affects lipophilicity, solubility, protein binding, and ability to pass through the plasma membrane.
Kamel Mansouri   +9 more
doaj   +1 more source

The ASPIRE framework for software protection [PDF]

open access: yes, 2016
In the ASPIRE research project, a software protection tool flow was designed and prototyped that targets native ARM Android code. This tool flow supports the deployment of a number of protections against man-at-the-end attacks.
Basile, Cataldo   +6 more
core   +2 more sources

Home - About - Disclaimer - Privacy