Results 61 to 70 of about 1,373,531 (205)
On the mathematical theory of combined streams [PDF]
William John Macquorn Rankine
openalex +1 more source
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users [PDF]
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream.
Abdelberi, Chaabane+6 more
core +3 more sources
Presentation about a telemetry framework for collecting metrics following model-based approach.
Tejería, Sonia Fernández+2 more
openaire +2 more sources
THE DETERMINATION OF THE LEVEL OF LEUKOCYTES IN THE BLOOD STREAM WITH INFLAMMATION. A THERMOSTABLE COMPONENT CONCERNED IN THE MECHANISM OF LEUKOCYTOSIS [PDF]
Valy Menkin, Ruth Lewin, Louise Pirovane
openalex +1 more source
On a peculiarity in the course of certain streams in the London and Hampshire Basins [PDF]
H.J. Osborne White
openalex +1 more source
Streams in the desert : a picture of life in Livingstonia [PDF]
J. H Morrison
openalex +1 more source
The Convection of Heat from a Body cooled by a Stream of Fluid [PDF]
Alexander Russell
openalex +1 more source
On the Force acting on a Vortex in a Non-uniform Stream of a Viscous Fluid
S. Syōno
openalex +2 more sources
A Lecture ON THE MUCOUS CHANNELS AND THE BLOOD STREAM AS ALTERNATIVE ROUTES OF INFECTION [PDF]
C. J. Bond
openalex +1 more source