-
281
-
282
Transfusion in trauma: empiric or guided therapy?
Published 2025-01-01Subjects: Get full text
Article -
283
La protection et la valorisation juridique de la biodiversité de la Caraïbe et des Guyanes : propriété intellectuelle et dispositif APA
Published 2012-09-01Subjects: Get full text
Article -
284
A novel improved flooding algorithm for DSR protocol in MANET
Published 2016-10-01Subjects: “…dynamic source routing protocol…”
Get full text
Article -
285
Analysis and improvement of the BACnet/IP based on identity authentication
Published 2024-03-01Subjects: Get full text
Article -
286
Neighbor Session Solutions for Integrated Routing Protocols
Published 2024-12-01Subjects: “…routing protocol…”
Get full text
Article -
287
AODV protocol for acoustic-radio integrated network based on location information and energy balance
Published 2023-03-01Subjects: Get full text
Article -
288
-
289
Automated mining of packet signatures for traffic identification at application layer with apriori algorithm
Published 2008-01-01Subjects: “…automatically extracted signatures of protocols…”
Get full text
Article -
290
CF-RIP: a convergence-free mechanism for RIP protocol
Published 2010-01-01Subjects: “…RIP protocols…”
Get full text
Article -
291
Carbon sustainability reporting based on GHG protocol framework: A Malaysian practice towards net-zero carbon emissions
Published 2025-02-01Subjects: Get full text
Article -
292
Constructing fair-exchange protocols for cloud computing
Published 2013-03-01Subjects: Get full text
Article -
293
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01Subjects: Get full text
Article -
294
Santé et sécurité du travail et formation professionnelle : Prochaine cible d’intérêt
Published 2006-11-01Subjects: Get full text
Article -
295
From the idea to the user: a pragmatic multifaceted approach to testing occupational exoskeletons
Published 2025-01-01Subjects: Get full text
Article -
296
Exploring strategies to enhance patient safety in spine surgery: a review
Published 2025-01-01Subjects: Get full text
Article -
297
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01Subjects: “…dynamic host configuration protocol…”
Get full text
Article -
298
Efficient authentication scheme for double-layer satellite network
Published 2019-03-01Subjects: Get full text
Article -
299
Architecture design of multi-protocol controller based on software definition
Published 2020-10-01Subjects: “…multi-protocol compatibility…”
Get full text
Article -
300
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Subjects: “…multi-parties key agreement protocol…”
Get full text
Article