Found: 249
Select item for more details and to access through your institution.
Astilbe Chinensis ethanol extract suppresses inflammation in macrophages via NF-κB pathway.
- Published in:
- BMC Complementary Medicine & Therapies, 2020, v. 20, n. 1, p. N.PAG, doi. 10.1186/s12906-020-03073-5
- By:
- Publication type:
- Article
Angiographic and Clinical Factors Related with Good Functional Outcome after Mechanical Thrombectomy in Acute Cerebral Artery Occlusion.
- Published in:
- Journal of Korean Neurosurgical Society, 2015, v. 58, n. 3, p. 192, doi. 10.3340/jkns.2015.58.3.192
- By:
- Publication type:
- Article
Symmetry-Adapted Machine Learning for Information Security.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 7, p. 941, doi. 10.3390/sym11070941
- By:
- Publication type:
- Article
Advances in Future Internet and the Industrial Internet of Things.
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 8, p. 164, doi. 10.3390/sym9080164
- By:
- Publication type:
- Article
DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 1, p. 8, doi. 10.3390/sym9010008
- By:
- Publication type:
- Article
Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 1, p. 1, doi. 10.3390/sym9010001
- By:
- Publication type:
- Article
The Design and Analysis of a Secure Personal Healthcare System Based on Certificates.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 11, p. 129, doi. 10.3390/sym8110129
- By:
- Publication type:
- Article
Scenario-Based Digital Forensics Challenges in Cloud Computing.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 10, p. 107, doi. 10.3390/sym8100107
- By:
- Publication type:
- Article
Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 10, p. 106, doi. 10.3390/sym8100106
- By:
- Publication type:
- Article
Optional Frame Selection Algorithm for Adaptive Symmetric Service of Augmented Reality Big Data on Smart Devices.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 5, p. 37, doi. 10.3390/sym8050037
- By:
- Publication type:
- Article
Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 3, p. 1567, doi. 10.3390/sym7031567
- By:
- Publication type:
- Article
Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 935, doi. 10.3390/sym7020935
- By:
- Publication type:
- Article
The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 383, doi. 10.3390/sym7020383
- By:
- Publication type:
- Article
Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 546, doi. 10.3390/sym7020546
- By:
- Publication type:
- Article
Live Mobile Distance Learning System for Smart Devices.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 294, doi. 10.3390/sym7020294
- By:
- Publication type:
- Article
Output Effect Evaluation Based on Input Features in Neural Incremental Attribute Learning for Better Classification Performance.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 53, doi. 10.3390/sym7010053
- By:
- Publication type:
- Article
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.
- Published in:
- Symmetry (20738994), 2014, v. 6, n. 4, p. 997, doi. 10.3390/sym6040997
- By:
- Publication type:
- Article
Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities.
- Published in:
- Mathematical Biosciences & Engineering, 2024, v. 21, n. 8, p. 1, doi. 10.3934/mbe.2024307
- By:
- Publication type:
- Article
A Lightweight authentication scheme for IoT against Rogue Base Station Attacks.
- Published in:
- Mathematical Biosciences & Engineering, 2022, v. 19, n. 11, p. 11735, doi. 10.3934/mbe.2022546
- By:
- Publication type:
- Article
Características de la enfermedad inflamatoria intestinal con respecto a otros centros nacionales de Colombia.
- Published in:
- Revista Colombiana de Gastroenterología, 2022, v. 37, n. 1, p. 48, doi. 10.22516/25007440.752
- By:
- Publication type:
- Article
Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices.
- Published in:
- Mathematical Problems in Engineering, 2014, p. 1, doi. 10.1155/2014/683982
- By:
- Publication type:
- Article
ALCA: agent learning–based clustering algorithm in vehicular ad hoc networks.
- Published in:
- Personal & Ubiquitous Computing, 2013, v. 17, n. 8, p. 1683, doi. 10.1007/s00779-012-0600-8
- By:
- Publication type:
- Article
Modeling user-generated contents: an intelligent state machine for user-centric search support.
- Published in:
- Personal & Ubiquitous Computing, 2013, v. 17, n. 8, p. 1731, doi. 10.1007/s00779-012-0607-1
- By:
- Publication type:
- Article
Theme issues on U-Business service and strategy, and U-Healthcare.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Authentication and ID-Based Key Management Protocol in Pervasive Environment.
- Published in:
- Wireless Personal Communications, 2010, v. 55, n. 1, p. 91, doi. 10.1007/s11277-009-9788-y
- By:
- Publication type:
- Article
Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
- Published in:
- Wireless Personal Communications, 2010, v. 55, n. 1, p. 65, doi. 10.1007/s11277-009-9786-0
- By:
- Publication type:
- Article
Editorial: Special Issue on “Information Security and Data Protection in Future Generation Communication and Networking”.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 1, p. 1, doi. 10.1007/s11277-008-9594-y
- By:
- Publication type:
- Article
Performance Optimization with Efficient Polling Mechanism in IEEE 802.16 Networks with Cross-Layer Consideration.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 3, p. 635, doi. 10.1007/s11277-009-9747-7
- By:
- Publication type:
- Article
RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 1, p. 193, doi. 10.1007/s11277-008-9600-4
- By:
- Publication type:
- Article
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 1, p. 209, doi. 10.1007/s11277-008-9601-3
- By:
- Publication type:
- Article
SOF System; A New Nomenclature System for the Surgical Techniques of Cervical Spine Deformity.
- Published in:
- Neurospine, 2020, v. 17, n. 3, p. 505, doi. 10.14245/ns.2040472.236
- By:
- Publication type:
- Article
Evaluation and Surgical Planning for Craniovertebral Junction Deformity.
- Published in:
- Neurospine, 2020, v. 17, n. 3, p. 554, doi. 10.14245/ns.2040510.255
- By:
- Publication type:
- Article
Chain-to-chain inventory transshipment model and robust switch control in CSC networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 4, p. 423, doi. 10.1002/cpe.1693
- By:
- Publication type:
- Article
Multi-WSN Simulator with Log Data for Efficient Sensing on Internet of Things.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/348682
- By:
- Publication type:
- Article
Attendance Check System and Implementation for Wi-Fi Networks Supporting Unlimited Number of Concurrent Connections.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/508698
- By:
- Publication type:
- Article
Pervasive Sensing Technologies and Emerging Trends.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Visual Scheme Monitoring of Sensors for Fault Tolerance on Wireless Body Area Networks with Cloud Service Infrastructure.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, v. 10, n. 4, p. 1, doi. 10.1155/2014/154180
- By:
- Publication type:
- Article
An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, v. 10, n. 2, p. 1, doi. 10.1155/2014/505242
- By:
- Publication type:
- Article
An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/50524
- By:
- Publication type:
- Article
Ensuring Healthcare Services Provision: An Integrated Approach of Resident Contexts Extraction and Analysis via Smart Objects.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/481952
- By:
- Publication type:
- Article
Pervasive Sensing Technologies and Emerging Trends.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/303805
- By:
- Publication type:
- Article
Visual Scheme Monitoring of Sensors for Fault Tolerance on Wireless Body Area Networks with Cloud Service Infrastructure.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/154180
- By:
- Publication type:
- Article
Visual Scheme for the Detection of Mobile Attack on WSN Simulator.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, v. 9, n. 8, p. 1, doi. 10.1155/2013/502082
- By:
- Publication type:
- Article
Improving Performance through REST Open API Grouping for Wireless Sensor Network.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/958241
- By:
- Publication type:
- Article
A QoS Model for a RFID Enabled Application with Next-Generation Sensors for Manufacturing Systems.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/829691
- By:
- Publication type:
- Article
Maximizing Network Lifetime of Directional Sensor Networks Considering Coverage Reliability.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/583753
- By:
- Publication type:
- Article
Visual Scheme for the Detection of Mobile Attack on WSN Simulator.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/502082
- By:
- Publication type:
- Article
The management of the displaced medial wall in complex acetabular fractures using plates and additional cerclage.
- Published in:
- Hip International, 2013, v. 23, n. 3, p. 323, doi. 10.5301/hipint.5000027
- By:
- Publication type:
- Article