Auswahl der wissenschaftlichen Literatur zum Thema „Canaux auxiliares“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Canaux auxiliares" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Canaux auxiliares"
SIMI JUNIOR, Jacy, Hildeberto Francisco PESCE und João Marcelo Ferreira de MEDEIROS. „Eficácia de substâncias químicas auxiliares na instrumentação de canais radiculares“. Revista de Odontologia da Universidade de São Paulo 13, Nr. 2 (April 1999): 153–57. http://dx.doi.org/10.1590/s0103-06631999000200009.
Der volle Inhalt der QuelleFigueirêdo Júnior, Ernani Canuto, Janaina Emanuella Galvão Menezes Almeida, Eucaé Miranda Missias, Renata Correia Sotero Dália Torres und Mônica Soares De Albuquerque. „Magnificação e ultrassom como recursos auxiliares no tratamento endodôntico em dentes com calcificação: considerações clínicas e relato de caso“. ARCHIVES OF HEALTH INVESTIGATION 10, Nr. 1 (26.01.2021): 174–78. http://dx.doi.org/10.21270/archi.v10i1.4954.
Der volle Inhalt der QuelleLi, Q., B. Xu, Y. Wang und Y. Cai. „Effects of Auxiliary Fiber Posts on Endodontically Treated Teeth With Flared Canals“. Operative Dentistry 36, Nr. 4 (01.07.2011): 380–89. http://dx.doi.org/10.2341/10-283-l.
Der volle Inhalt der QuelleO’Connor, Christopher D., Tyler Frederick, Jacek Koziarski, Victoria Baker und Kaylee Kosoralo. „Auxiliary Police Volunteer Experiences and Motivations to Volunteer in Canada“. Policing: A Journal of Policy and Practice 16, Nr. 1 (13.11.2021): 152–66. http://dx.doi.org/10.1093/police/paab071.
Der volle Inhalt der QuelleKeay, Brian A., Shawn P. Maddaford, Walter A. Cristofoli, Neil G. Andersen, Marco S. Passafaro, Noel S. Wilson und James A. Nieman. „1996 Merck Frosst Award Lecture Synthetic adventures along a Rocky Mountain road“. Canadian Journal of Chemistry 75, Nr. 9 (01.09.1997): 1163–71. http://dx.doi.org/10.1139/v97-139.
Der volle Inhalt der QuelleBélanger1, Roxanne, Chantal Mayer-Crittenden, Josée Mainguy und Anie Coutu. „Enquête sur l’offre active pour les services auxiliaires de santé du Nord-Est de l’Ontario“. Reflets 24, Nr. 2 (15.11.2018): 212–47. http://dx.doi.org/10.7202/1053869ar.
Der volle Inhalt der QuelleSilva, Daniela Ribeiro da, und Ivaldo Gomes de Moraes. „Influence of different auxiliary agents of biomechanical preparation in the filling of "artificially prepared" lateral canals“. Journal of Applied Oral Science 13, Nr. 2 (Juni 2005): 147–51. http://dx.doi.org/10.1590/s1678-77572005000200010.
Der volle Inhalt der QuelleDenise COSTA, Fabiana DALMINA und Luis Eduardo Duarte IRALA. „O uso do vinagre como auxiliar químico em Endodontia: uma revisão de literatura“. RSBO 6, Nr. 2 (30.06.2010): 185–93. http://dx.doi.org/10.21726/rsbo.v6i2.1214.
Der volle Inhalt der QuelleBostan, Ion, Sergiu Mazuru und Maxim Casian. „Method of axial adjustment for precessional transmissions“. MATEC Web of Conferences 178 (2018): 06024. http://dx.doi.org/10.1051/matecconf/201817806024.
Der volle Inhalt der QuelleCollins, Peter. „New-Dialect Formation in Canada: Evidence from the English Modal Auxiliaries by Stefan Dollinger“. World Englishes 29, Nr. 3 (16.08.2010): 439–42. http://dx.doi.org/10.1111/j.1467-971x.2010.01664_4.x.
Der volle Inhalt der QuelleDissertationen zum Thema "Canaux auxiliares"
Proy, Julien. „Sécurisation systématique d'applications embarquées contre les attaques physiques“. Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLEE048.
Der volle Inhalt der QuelleThe security of embedded systems containing sensitive data has become a main concern. These widely deployed devices are subject to physcial attacks, requiring protections both in hardware and software. The race for higher productivity and shorter time to market in the deployment of secure systems pushes for automatic solutions. This thesis studies the integration of software countermeasures against fault attacks in development tools, with a special focus on the compiler. The goal is to enable the automatic application, at compilation time, of a wide range of countermeasures. We propose two protection schemes against these attacks which can be automatically deployed: one scheme dedicated to loop control flow and the second dedicated to the protection of the call graph. These schemes, integrated in the LLVM compiler framework, allow to focus security application on sensitive areas of the targeted code, thus limitating the overhead. Faults that can be exploited are different from a device to another, we thus also provide an ISA-level characterization of fault effects on a superscalar processor representative of mobile phones. This work highlights the need of studying fault effects on more complex platforms, leading to the design of new protection schemes and automating their compilation-time application
Houssein, Meraneh Awaleh. „Enhancing the security of industrial cyber-physical systems trough side-channel leakage“. Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2024. http://www.theses.fr/2024IMTA0402.
Der volle Inhalt der QuelleIndustrial cyber-physical systems(ICPSs) have increased in industrial processes.These systems facilitate automation and operational control through physical devices, resource constrained sensors and actuators, digital software, and network connectivity. Although ICPSs have proven effective in improving efficiency levels, they are susceptible to cyber-attacks that could cause significant harm. This thesis aims to enhance the security of ICPS by using side-channel leakage. This research focuses on two key aspects. Firstly, this thesis provides effective and efficient methods to detect and mitigate anomalies in ICPS by using side-channel leakage, ensuring these systems' security and proper functioning. The study proposes a new real-time sound-based anomaly detection approach called SADIS for early and accurate detection of anomalies in ICPS. The SADIS approach addresses the limitations faced by existing methods in detecting anomalies in ICPS, including high detection time, low detection accuracy, and poor robustness to noisy data. SADIS is robust against background noise and transferable to various industrial environments, making it suitable for widespread deployment. Secondly, the thesis studies the resistance of lightweight cryptography algorithms commonly implemented in resource-constrained components of industrial systems, including sensors, actuators, and RFID devices, against side-channel analysis. We propose a theoretical attack on the Elephant algorithm's linear feedback shift registers (LFSR), a finalist in the NIST lightweight cryptography competition. By exploiting the dependence on the secret key, we demonstrate how side-channel analysis can compromise the security of Elephant. We explore possible tweaking to the Elephant algorithm as counter measures against such attacks
Goyet, Christopher. „Cryptanalyse algébrique par canaux auxiliaires“. Paris 6, 2012. http://www.theses.fr/2012PA066329.
Der volle Inhalt der QuelleAlgebraic Side Channel Attacks (ASCA) are a new kind of attack presented at CHES2009 by Renauld and Standaert. They showed thatside-channel information leads to effective algebraic attacks, butthese results are mostly experiments strongly based on a SAT-solver. In this talk, we will present a theoretical study which explains andcharacterizes the algebraic phase of these attacks. We study a moregeneral algebraic attack based on Grobner basis methods. We show thatthe complexity of the Grobner basis computations in these attacksdepends on a new notion of algebraic immunity that we define, and onthe distribution of the leakage information of the cryptosystem. Weillustrate this analysis by two examples of attacks on block-ciphersAES and PRESENT with usual leakage models: the Hamming weight and theHamming distance models. Finally, a new criterion for effectivealgebraic side channel attacks is defined. This easily computablecriterion unifies both SAT and Grobner attacks. This criterion alsorestricts the choice of resisting S-Box against ASCA. At CHES 2009, Renauld, Standaert and Veyrat- Charvillon introduced a new kind of attack called algebraic side-channel attacks (ASCA). They showed that side-channel information leads to effective algebraic attacks. These results are mostly experiments since strongly based on the use of a SAT solver. This article presents a theoretical study to explain and to characterize the algebraic phase of these attacks. We study more general algebraic attacks based on Gröbner meth- ods. We show that the complexity of the Gröbner basis com- putations in these attacks depends on a new notion of alge- braic immunity defined in this paper, and on the distribution of the leakage information of the cryptosystem. We also study two examples of common leakage models: the Hamming weight and the Hamming distance models. For instance, the study in the case of the Hamming weight model gives that the probability of obtaining at least 64 (resp. 130) linear relations is about 50% for the substitution layer of PRESENT (resp. AES). Moreover if the S-boxes are replaced by functions maximizing the new algebraic immunity criterion then the algebraic attacks (Gröbner and SAT) are intractable. From this theoretical study, we also deduce an invariant which can be easily computed from a given S-box and provides a suffi- cient condition of weakness under an ASCA. This new invari- ant does not require any sophisticated algebraic techniques to be defined and computed. Thus, for cryptographic engi- neers without an advanced knowledge in algebra (e. G. Gröb- ner basis techniques), this invariant may represent an inter- esting tool for rejecting weak S-boxes. We describe a lattice attack on DSA-like signature schemes under the assumption that implicit infor- mation on the ephemeral keys is known. Inspired by the implicit oracle of May and Ritzenhofen presented in the context of RSA (PKC2009), we assume that the ephemeral keys share a certain amount of bits without knowing the value of the shared bits. This work also extends results of Leadbitter, Page and Smart (CHES2004) which use a very similar type of partial information leakage. By eliminating the shared blocks of bits between the ephemeral keys, we provide lattices of small dimension (e. G. Equal to the number of signatures) and thus obtain an efficient attack. More precisely, by using the LLL algorithm, the complexity of the attack is polynomial. We show that this method can work when ephemeral keys share certain amount of MSBs and/or LSBs, as well as contiguous blocks of shared bits in the middle. Under the Gaussian heuristic assumption, theoretical bounds on the number of shared bits in function of the number of signed messages are proven. Experimental results show that we are often able to go a few bits beyond the theoretical bound. For instance, if only 2 shared LSBs on each ephemeral keys of 200 signed messages (with no knowledge about the secret key) then the attack reveals the secret key. The success rate of this attack is about 90% when only 1 LSB is shared on each ephemeral keys associated with about 400 signed messages
Dugardin, Margaux. „Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique“. Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0035/document.
Der volle Inhalt der Quelle: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorithms on embedded devices. Indeed, each electronic component produces physical emanations, such as the electromagnetic radiation, the power consumption or the execution time. Besides, these emanations reveal some information on the internal state of the computation. A wise attacker can retrieve secret data in the embedded device using the analyzes of the involuntary “leakage”, that is side channel attacks. This thesis focuses on the security evaluation of asymmetric cryptographic algorithm such as RSA and ECC. In these algorithms, the main leakages are observed on the modular multiplication. This thesis presents two attacks targeting the modular multiplication in protected algorithms, and a formal demonstration of security level of a countermeasure named modular extension. A first attack is against scalar multiplication on elliptic curve implemented with a regular algorithm and scalar blinding. This attack uses a unique acquisition on the targeted device and few acquisitionson another similar device to retrieve the whole scalar. A horizontal leakage during the modular multiplication over large numbers allows to detect and correct easily an error bit in the scalar. A second attack exploits the final subtraction at the end of Montgomery modular multiplication. By studying the dependency of consecutive multiplications, we can exploit the information of presence or absence of final subtraction in order to defeat two protections : regular algorithm and blinding input values. Finally, we prove formally the security level of modular extension against first order fault attacks applied on elliptic curves cryptography
Dugardin, Margaux. „Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique“. Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0035.
Der volle Inhalt der Quelle: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorithms on embedded devices. Indeed, each electronic component produces physical emanations, such as the electromagnetic radiation, the power consumption or the execution time. Besides, these emanations reveal some information on the internal state of the computation. A wise attacker can retrieve secret data in the embedded device using the analyzes of the involuntary “leakage”, that is side channel attacks. This thesis focuses on the security evaluation of asymmetric cryptographic algorithm such as RSA and ECC. In these algorithms, the main leakages are observed on the modular multiplication. This thesis presents two attacks targeting the modular multiplication in protected algorithms, and a formal demonstration of security level of a countermeasure named modular extension. A first attack is against scalar multiplication on elliptic curve implemented with a regular algorithm and scalar blinding. This attack uses a unique acquisition on the targeted device and few acquisitionson another similar device to retrieve the whole scalar. A horizontal leakage during the modular multiplication over large numbers allows to detect and correct easily an error bit in the scalar. A second attack exploits the final subtraction at the end of Montgomery modular multiplication. By studying the dependency of consecutive multiplications, we can exploit the information of presence or absence of final subtraction in order to defeat two protections : regular algorithm and blinding input values. Finally, we prove formally the security level of modular extension against first order fault attacks applied on elliptic curves cryptography
Leplus, Gaëtan. „Processeur résistant et résilient aux attaques de fautes et aux attaques par canaux auxiliaires“. Electronic Thesis or Diss., Saint-Etienne, 2023. http://www.theses.fr/2023STET0059.
Der volle Inhalt der QuelleIn today's technological landscape, the Internet of Things (IoT) has emerged as a ubiquitous element, yet it brings major security challenges. Fault injection and side-channel attacks are of particular concern, targeting systemic weaknesses and compromising data integrity and confidentiality. Processors, as the cornerstones of computing systems, are crucial in securing the IoT.This thesis focuses on securing the processor pipeline to counter these threats. The significance of this research is highlighted by the need to develop robust security mechanisms at the processor level, the core of all computation and control. Several countermeasures are proposed to enhance the resilience of different parts of the processor against attacks.To secure the data path, an integrity tagging method is proposed. Compatible with traditional masking techniques, this method aims to ensure data integrity throughout the processing pipeline, with minimal overhead.For the instruction path, a mechanism for masking the current instruction is proposed, where a mask is generated based on the previous instruction. This innovative technique enables effective instruction security with very low overhead.Regarding the desynchronization process, it introduces a robust method for inserting dummy instructions more efficiently than current techniques.These countermeasures, by targeting key components of the processor, contribute to a notable improvement in the security of IoT systems. They address the roots of vulnerabilities, thus providing enhanced protection against a wide range of attacks
Fernandes, Medeiros Stéphane. „Attaques par canaux auxiliaires: nouvelles attaques, contre-mesures et mises en oeuvre“. Doctoral thesis, Universite Libre de Bruxelles, 2015. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209096.
Der volle Inhalt der QuelleDoctorat en Sciences
info:eu-repo/semantics/nonPublished
Barthe, Lyonel. „Stratégies pour sécuriser les processeurs embarqués contre les attaques par canaux auxiliaires“. Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20046/document.
Der volle Inhalt der QuelleSide-channel attacks such as differential power analysis (DPA) and differential electromagnetic analysis (DEMA) pose a serious threat to the security of embedded systems. The aim of this thesis is to study the side-channel vulnerabilities of software cryptographic implementations in order to create a new class of processor. For that purpose, we start by identifying the different elements of embedded processors that can be exploited to reveal the secret information. Then, we introduce several strategies that seek a balance between performance and security to protect such architectures at the register transfer level (RTL). We also present the design and implementation details of a secure processor, the SecretBlaze-SCR. Finally, we evaluate the effectiveness of the proposed solutions against global and local electromagnetic analyses from experimental results obtained with a FPGA-based SecretBlaze-SCR. Through this case study, we show that a suitable combination of countermeasures significantly increases the side-channel resistance of processors while maintaining satisfactory performance for embedded systems
Vaquié, Bruno. „Contributions à la sécurité des circuits intégrés face aux attaques par canaux auxiliaires“. Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20133/document.
Der volle Inhalt der QuelleSide channel attacks such as power analysis attacks are a threat to the security of integrated circuits.They exploit the physical leakage of circuits during the cryptographic computations to retrieve the secret informations they contain. Many countermeasures, including hardware, have been proposed by the community in order to protect cryptosystems against such attacks. Despite their effectiveness, their major drawback is their significant additional cost in area, speed and consumption. This thesis aims at proposing low cost countermeasures able to reduce the leaks and offering a good compromise between security and costs. First we identify the main sources of leakage of a cryptographic system that integrates an iterative hardware architecture of a symetric algorithm. Then we propose several low cost countermeasures, which aim at reducing this leakage. Finally, we evaluate the robustness of our solutions against side channel attacks
Dosso, Fangan Yssouf. „Contribution de l'arithmétique des ordinateurs aux implémentations résistantes aux attaques par canaux auxiliaires“. Electronic Thesis or Diss., Toulon, 2020. http://www.theses.fr/2020TOUL0007.
Der volle Inhalt der QuelleThis thesis focuses on two currently unavoidable elements of public key cryptography, namely modular arithmetic over large integers and elliptic curve scalar multiplication (ECSM). For the first one, we are interested in the Adapted Modular Number System (AMNS), which was introduced by Bajard et al. in 2004. In this system of representation, the elements are polynomials. We show that this system allows to perform modular arithmetic efficiently. We also explain how AMNS can be used to randomize modular arithmetic, in order to protect cryptographic protocols implementations against some side channel attacks. For the ECSM, we discuss the use of Euclidean Addition Chains (EAC) in order to take advantage of the efficient point addition formula proposed by Meloni in 2007. The goal is to first generalize to any base point the use of EAC for ECSM; this is achieved through curves with one efficient endomorphism. Secondly, we propose an algorithm for scalar multiplication using EAC, which allows error detection that would be done by an attacker we detail
Bücher zum Thema "Canaux auxiliares"
Québec (Province). Ministère des forêts., Hrsg. Entente auxiliaire Canada-Québec sur le développement forestier. [Québec]: Gouvernement du Québec, Ministère des forêts, 1992.
Den vollen Inhalt der Quelle findenDollinger, Stefan. New-dialect formation in Canada: Evidence from the English modal auxiliaries. Amsterdam: John Benjamins Pub., 2008.
Den vollen Inhalt der Quelle findenrégionale, Canada Ministère de l'expansion industrielle. Entente Auxiliaire Canada-Québec sur le Développement Touristique 1985-1990. S.l: s.n, 1985.
Den vollen Inhalt der Quelle finden(Province), Québec, Hrsg. Entente auxiliaire Canada-Québec sur le développement touristique au Québec. [Ottawa: Govt. of] Canada, 1992.
Den vollen Inhalt der Quelle findenCanada. Ministère de l'expansion industrielle régionale. Entente Auxiliaire Canada-Québec sur le Développement des Entreprises de Communication 1984-1990. S.l: s.n, 1985.
Den vollen Inhalt der Quelle finden(Province), Québec, und Québec (Province). Ministère des communications. Direction des communications., Hrsg. Entente auxiliaire Canada-Québec sur le développement des entreprises de communication 1985-1990: Les programmes d'aide. 2. Aufl. [Québec]: Direction des communications du Ministère des communications du Québec, 1987.
Den vollen Inhalt der Quelle findenMaluzynsky, Patrece. A labour of love: A 50 year history of St. Andrew's Ukrainian Orthodox Ladies Auxiliary. Edmonton: St. Andrew's Ukrainian Orthodox Ladies Auxiliary, 2011.
Den vollen Inhalt der Quelle findenEntente auxiliaire spéciale Canada-Québec sur le développement forestier de la Haute-Côte-Nord. Entente auxiliaire spéciale Canada-Québec sur le développement forestier de la Haute-Côte-Nord (1987-1992): Rapport final. Québec, Qué: Ministère des ressources naturelles, 1996.
Den vollen Inhalt der Quelle findenBélanger, Éric. Évaluation du volet recherche et développement de l'entente auxiliaire Canada-Québec sue le développement des transports / Éric Bélanger. [Québec, Québec: Gouvernement du Québec, Ministère des transports, 1992.
Den vollen Inhalt der Quelle findenMurray, Sylvie. À la jonction du mouvement ouvrier et du mouvement des femmes: La ligue auxiliare de l'association internationale des machinistes, Canada, 1903-1980. [Montréal?]: Regroupement des chercheurs-chercheures en histoire des travailleurs et travailleuses du Québec, 1990.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Canaux auxiliares"
Parent, Rick. „Auxiliary and Reserve Constables in Canada“. In Police Reserves and Volunteers, 127–37. New York: Routledge, 2017. http://dx.doi.org/10.4324/9781315367460-12.
Der volle Inhalt der QuelleFerreira, Antônio Fabricio Alves, Leandro Rodrigues de Sena, Samara de Freitas Guimarães, Andres Felipe Millan Cardenas, Fabiana Suelen Figuerêdo de Siqueira, Rossana Aboud Matos de Almeida, Gustavo Leon Oliveira Soares et al. „EFICÁCIA DOS METÓDOS AUXILIARES NA IRRIGAÇÃO DO SISTEMA DE CANAIS RADICULARES: UMA REVISÃO DE LITERATURA“. In Tópicos da odontologia aplicada - Volume 6. Editora Pascal LTDA, 2024. http://dx.doi.org/10.29327/5391781.1-1.
Der volle Inhalt der QuelleParent, Rick. „Auxiliary and Reserve Constables in Canada“. In Police Reserves and Volunteers, 127–37. Routledge, 2017. http://dx.doi.org/10.1201/9781315367460-13.
Der volle Inhalt der QuelleAraújo, Cibelly Mara Pereira, Ana Carolina Duarte Corlaitti Duarte, Thais Martins Jajah Carlos, Mariana Alves Rossi Faleiros, Glaciele Maria de Souza, Warley Silva de Oliveira, Túlio Bruno Cavalhero de Oliveira, Renata Pereira Georjutti und Débora Souto-Souza. „Use of calcium hydroxide as an intracanal medication in permanent teeth: A brief review of the literature“. In Current Challenges in Dentistry: Theory and Clinical Practice. Seven Editora, 2024. http://dx.doi.org/10.56238/sevened2023.005-010.
Der volle Inhalt der QuelleWeddle, Kevin J. „Laying the Groundwork“. In The Compleat Victory:, 86–101. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780195331400.003.0006.
Der volle Inhalt der QuelleFranses, Philip Hans. „An Introduction to Seasonal Time Series“. In Periodicity and Stochastic Trends In Economic Time Series, 32–48. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780198774532.003.0003.
Der volle Inhalt der QuelleSouza, Simone Silva Frutuoso De. „REALIDADE VIRTUAL APLICADA COMO FERRAMENTA DE ENSINO-APRENDIZADO NA DISCIPLINA DE BIOLOGIA“. In Open Science Research XI, 545–59. Editora Científica Digital, 2023. http://dx.doi.org/10.37885/230312364.
Der volle Inhalt der QuelleSilva, Clara Iasmim Aparecida Souza e., Ana Beatriz Hermínia Ribeiro Ducati de Sampaio, Caio Vinicius Teixeira Nogueira, Eliane Maria Gonçalves Moreira de Vasconcelos, Jéssica Christie Souza e. Silva, Layanna Leite Pinto Macêdo, Luane Cristina Fernandes Teixeira und Cicero Lucas Gomes Ramalho. „EFEITOS DA OZONIOTERAPIA COMO MÉTODO COADJUVANTE NA DESINFECÇÃO DOS CANAIS RADICULARES“. In Atualidades em Medicina e Saúde, 9–24. Inove Primer, 2024. http://dx.doi.org/10.29327/5399445.1-1.
Der volle Inhalt der QuelleHewitt, Nancy A. „Worldly Associations, 1836–1841“. In Radical Friend, 65–90. University of North Carolina Press, 2018. http://dx.doi.org/10.5149/northcarolina/9781469640327.003.0004.
Der volle Inhalt der QuelleFreitas, Lara Brunelle Almeida, Fabiana Faxina und Marcus Aurelius de Oliveira Vasconcelos. „AJU INTELLIGENCE TOUR: UM APLICATIVO PARA O TURISMO INTELIGENTE NA CIDADE DE ARACAJU (SERGIPE - BRASIL)“. In Estudos em Turismo: Desafios e Caminhos, 185–208. 2. Aufl. Ópera, 2023. http://dx.doi.org/10.29327/5398227.2-1.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Canaux auxiliares"
Martins, Eliane. „Um Sistema de Comunicação para Ambiente de Multiprocessadores“. In Simpósio Brasileiro de Arquitetura de Computadores e Processamento Paralelo. Sociedade Brasileira de Computação, 1987. http://dx.doi.org/10.5753/sbac-pad.1987.23558.
Der volle Inhalt der Quellede Oliveira, Francisco Kelsen, José Rogério Santana und Maria Gilvanise de Oliveira Pontes. „O vídeo pela Internet como ferramenta educacional“. In Workshop de Informática na Escola. Sociedade Brasileira de Computação - SBC, 2010. http://dx.doi.org/10.5753/wie.2010.25414.
Der volle Inhalt der QuelleCarvalho, Dárlinton, und Samuel Moreira Abreu Araújo. „Fotossenti: Um aplicativo para auxiliar em tratamentos psicológicos“. In XI Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2015. http://dx.doi.org/10.5753/sbsi.2015.5855.
Der volle Inhalt der QuelleSilva, Sandro Matheus Albuquerque da, Artur José da Silva, Maria Eduarda de Alencar Barreto, Bárbara Silva Gonzaga, Brenda da Silva Araújo, Eduarda Santos Silva und Bárbara Lacerda Carvalho. „A EFICÁCIA DA TERAPIA FOTODINÂMICA NO TRATAMENTO ENDODÔNTICO“. In XXVII Semana de Biomedicina Inovação e Ciência. Editora IME, 2021. http://dx.doi.org/10.51161/9786588884119/12.
Der volle Inhalt der QuelleMota, Fernanda, Matheus Gonçalves, Marilton Aguiar und Diana Adamatti. „Google Earth Engine e sua aplicabilidade na gestão de recursos hídricos“. In Workshop de Computação Aplicada à Gestão do Meio Ambiente e Recursos Naturais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wcama.2020.11030.
Der volle Inhalt der QuelleSilva, João, Tamires Silva, Marcos Lima und Ricardo Souza. „Aplicação do Design Centrado em Humano para Desenvolvimento de uma Solução de Software baseada em Informações do Tempo e Clima“. In X Workshop de Computação Aplicada à Gestão do Meio Ambiente e Recursos Naturais. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wcama.2019.6425.
Der volle Inhalt der QuelleJesus, Rosana, Karin Komati und Sérgio Nery Simões. „Comparação das Técnicas de Extração de Características HOG e LBP para Deteção de Glaucoma em Retinografias“. In Encontro Nacional de Computação dos Institutos Federais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/encompif.2020.11071.
Der volle Inhalt der QuelleWang, Meijing, und Yong Fang. „Analysis on the Clinical Observation of Fentanyl Combined with Imidazole Valium Auxiliary Intra-spinal Canal Anesthesia Effect“. In 2015 International Forum on Bioinformatics and Medical Engineering. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/bme-15.2015.19.
Der volle Inhalt der QuelleSantos, Cleber Brito, Aline Maria Santos Andrade und Alirio Santos de Sá. „Uma análise dos tempos limite para entrega de mensagens e para determinação de vizinhança em rede veiculares ad hoc“. In Workshop de Computação Urbana. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/courb.2023.799.
Der volle Inhalt der QuelleMenezes, Mathias A. G. de, Ricardo Maroquio B., Erick M. Moreira, Hebert Azevedo Sá. und Paulo F. F. Rosa. „Veículos Aéreos Não Tripulados para a Vigilância de Áreas Urbanas em Cidades Inteligentes“. In Workshop Brasileiro de Cidades Inteligentes. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/wbci.2022.223170.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Canaux auxiliares"
Tzonev. PR-396-143702-R01 Feasibility of a Petroleum Leak Detection Cable Utilizing Polymer Absorption Sensor. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 2015. http://dx.doi.org/10.55274/r0010849.
Der volle Inhalt der QuelleBolduc, Jolianne, Roxane Borgès Da Silva und François Vaillancourt. Gains en compétence et coûts financiers du rehaussement des différentes formations infirmières au Québec. CIRANO, Juni 2024. http://dx.doi.org/10.54932/mtda5129.
Der volle Inhalt der Quelle