Showing 941 - 960 results of 1,265 for search 'Hornsey~', query time: 2.47s Refine Results
  1. 941
  2. 942

    Unilateral Hemiparesis with Thoracic Epidural in an Adolescent by Rosalie F. Tassone, Christian Seefelder, Navil F. Sethna

    Published 2012-01-01
    “…We describe a case of a 16-year-old adolescent who developed repeated complete unilateral extensive epidural sensory and motor blockade with Horner’s syndrome after thoracic epidural catheter placement. …”
    Get full text
    Article
  3. 943
  4. 944

    Beelouse, Braula coeca Nitzsch (Insecta: Diptera: Braulidae) by Howard V. Weems, Jr., Malcolm T. Sanford

    Published 2004-02-01
    “… The beelouse, Braula coeca Nitzsch 1818, is a tiny commensalate wingless fly found in colonies of the honey bee, Apis mellifera Linnaeus, where it lives on the bodies of the bees and literally steals its food out of the mouth of its host. …”
    Get full text
    Article
  5. 945
  6. 946

    Beelouse, Braula coeca Nitzsch (Insecta: Diptera: Braulidae) by Howard V. Weems, Jr., Malcolm T. Sanford

    Published 2004-02-01
    “… The beelouse, Braula coeca Nitzsch 1818, is a tiny commensalate wingless fly found in colonies of the honey bee, Apis mellifera Linnaeus, where it lives on the bodies of the bees and literally steals its food out of the mouth of its host. …”
    Get full text
    Article
  7. 947

    Leafcutting Bees, Megachilidae (Insecta: Hymenoptera: Megachilidae: Megachilinae) by David Serrano

    Published 2005-06-01
    “…Leafcutting bees, Osmia spp. are even used as commercial pollinators (like honey bees) in crops such as alfalfa and blueberries. …”
    Get full text
    Article
  8. 948

    Citrus Diseases Exotic to Florida: Citrus Tristeza Virus– Stem Pitting (CTV-SP) by Kuang Ren Chung, Ronald H. Brlansky

    Published 2006-04-01
    “…This article is written based on the materials used for the Workshops of the Exotic Citrus Pathogen Threat Project led by Drs. S. M. Garnsey and H. W. Browning, and approved for publication. …”
    Get full text
    Article
  9. 949

    Citrus Diseases Exotic to Florida: Citrus Tristeza Virus– Stem Pitting (CTV-SP) by Kuang Ren Chung, Ronald H. Brlansky

    Published 2006-04-01
    “…This article is written based on the materials used for the Workshops of the Exotic Citrus Pathogen Threat Project led by Drs. S. M. Garnsey and H. W. Browning, and approved for publication. …”
    Get full text
    Article
  10. 950
  11. 951
  12. 952
  13. 953

    Leafcutting Bees, Megachilidae (Insecta: Hymenoptera: Megachilidae: Megachilinae) by David Serrano

    Published 2005-06-01
    “…Leafcutting bees, Osmia spp. are even used as commercial pollinators (like honey bees) in crops such as alfalfa and blueberries. …”
    Get full text
    Article
  14. 954
  15. 955
  16. 956
  17. 957
  18. 958
  19. 959
  20. 960

    Survey of network-layer anonymous communication protocols by Liangmin WANG, Xiaoling NI, Hui ZHAO

    Published 2020-02-01
    “…An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding,content encryption,and traffic obfuscation to hide communication relationships between entities and forwarded contents.However,there is a deficiency in the balance between performance and security as an anonymous communication system operating over an overlay network.With the advance of the future internet architectures,it is possible to build an infrastructure-based anonymous communication system.Such anonymous communication systems design anonymity as network infrastructure services and provide encryption operations for routers,which can solve the part problem of scalability and performance limitations of anonymous network.They can also be called network-layer anonymous communication protocols.The existing network-layer anonymous communication protocols (LAP,Dovetail,Hornet,PHI and Taranet) were studied.The classification standard of network-layer anonymous communication protocols were introduced.Its innovation point and specific encryption ideas were briefly described,and how to keep balance between security and performance was analyzed.The shortcomings and advantages of these kinds of network anonymous communication protocols were also pointed out.Finally,the challenges faced in the development of anonymous communication systems and the problems that need to be studied in depth were proposed.…”
    Get full text
    Article