Auswahl der wissenschaftlichen Literatur zum Thema „New protocol“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "New protocol" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "New protocol"

1

Gerard, Ian J., Jeffery A. Hall, Kelvin Mok und D. Louis Collins. „New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note“. Operative Neurosurgery 11, Nr. 3 (26.06.2015): 376–81. http://dx.doi.org/10.1227/neu.0000000000000868.

Der volle Inhalt der Quelle
Annotation:
Abstract BACKGROUND Newer versions of the commercial Medtronic StealthStation allow the use of only 8 landmark pairs for patient-to-image registration as opposed to 9 landmarks in older systems. The choice of which landmark pair to drop in these newer systems can have an effect on the quality of the patient-to-image registration. OBJECTIVE To investigate 4 landmark registration protocols based on 8 landmark pairs and compare the resulting registration accuracy with a 9-landmark protocol. METHODS Four different protocols were tested on both phantoms and patients. Two of the protocols involved using 4 ear landmarks and 4 facial landmarks and the other 2 involved using 3 ear landmarks and 5 facial landmarks. Both the fiducial registration error and target registration error were evaluated for each of the different protocols to determine any difference between them and the 9-landmark protocol. RESULTS No difference in fiducial registration error was found between any of the 8-landmark protocols and the 9-landmark protocol. A significant decrease (P < .05) in target registration error was found when using a protocol based on 4 ear landmarks and 4 facial landmarks compared with the other protocols based on 3 ear landmarks. CONCLUSION When using 8 landmarks to perform the patient-to-image registration, the protocol using 4 ear landmarks and 4 facial landmarks greatly outperformed the other 8-landmark protocols and 9-landmark protocol, resulting in the lowest target registration error.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sunder, Madhavi. „New Working Group on “Cultural Protocols” Convenes at New York University, 19 August 2011“. International Journal of Cultural Property 18, Nr. 4 (November 2011): 459–60. http://dx.doi.org/10.1017/s0940739111000361.

Der volle Inhalt der Quelle
Annotation:
Protocols in international law seem to be proliferating. Examples of official protocols at international law abound, from the 1967 Stockholm Protocol Regarding Developing Countries (amending the Berne Convention on copyright), to the 1997 Kyoto Protocol on climate change, to the recent Nagoya Protocol on Access and Benefit Sharing in 2010. But what exactly is a “protocol” compared to other international legal instruments, such as declarations and treaties? And why does there seem to be a flurry of new protocols today, in domains as vast as intellectual property and indigenous people's rights? On 19 August a new “working group” convened at the New York University School of Law to begin to study protocols, especially with an eye toward their use as a tool to protect indigenous cultural property—hence, the term “cultural protocols.” The working group is the brainchild of Dr. Jane Anderson of the University of Massachusetts and Professor Barton Beebe of the New York University School of Law.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Veronese, Sheila, Marco Cambiaghi und Andrea Sbarbati. „New Protocol for Auditory Brainstem Implant Positioning“. Neuroscience and Neurological Surgery 9, Nr. 5 (24.11.2021): 01–07. http://dx.doi.org/10.31579/2578-8868/203.

Der volle Inhalt der Quelle
Annotation:
Background: Surgery for applying the auditory brainstem implant is an otoneurosurgery that requires careful intraoperative monitoring to optimize the placement of the electrode paddle. This study aimed to validate a new method capable of increasing the accuracy of electrode array placement, reducing channel interaction, electrical artefacts, and saturation effects, and providing the largest number of electrodes that can be activated with the lowest possible electric charge. Materials and methods: Thirty-six subjects aged between 1.42 and 69.92 years were tested during surgery for auditory brainstem implantation. We recorded auditory electrical responses of the brainstem using the implant supplier's suggested stimulation protocol and the new protocol. Results: Saturations effects and electric artefacts were noticed respectively in 81.85% and 53.25% of recordings using implant supplier's method, while in 70.34% and 24.75% of recordings using the new method, with a percentage variation of 11.51% and 28.50%. Considering the amount of charge required to activate the electrodes, with the implant supplier's method an average charge of 14 nC was needed, while with the new protocol an average charge of 8 nC was necessary. Conclusions: The new method improves the coupling between the auditory brainstem implant and the surface of the cochlear nucleus.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Li, Fu Lin, Jie Yang, Hong Wei Zhou und Ying Liu. „A New Dynamic Protocol Analysis Model“. Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Der volle Inhalt der Quelle
Annotation:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Doswald-Beck, Louise. „New Protocol on Blinding Laser Weapons“. International Review of the Red Cross 36, Nr. 312 (Mai 1996): 272–99. http://dx.doi.org/10.1017/s0020860400089889.

Der volle Inhalt der Quelle
Annotation:
On 13 October 1995, the first Review Conference of the 1980 Convention on Certain Conventional Weapons (CCW) adopted during its first session in Vienna a new fourth Protocol entitled “Protocol on Blinding Laser Weapons”. The 1980 Convention comprises a framework Convention (containing technical provisions such as applicability, entry into force and amendment) and annexed Protocols containing the substantive rules relating to certain weapons. Although many weapons had been discussed during the preparatory stages of this Convention, only three Protocols were adopted in 1980. However, the structure chosen enabled new Protocols to be added in order to accommodate future weapons which needed t o be prohibited or otherwise regulated.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Dias, Álvaro Machado, und Adrian van Deusen. „A New Neurofeedback Protocol for Depression“. Spanish journal of psychology 14, Nr. 1 (Mai 2011): 374–84. http://dx.doi.org/10.5209/rev_sjop.2011.v14.n1.34.

Der volle Inhalt der Quelle
Annotation:
Context: Neurofeedback represents an exciting complementary option in the treatment of depression that builds upon a huge body of research on electroencephalographic correlates of depression. Objective: The objectives of this article are threefold: review the literature on neurofeedback protocols for depression; introduce a new protocol, which aims to synthesize the best qualities of the currently available protocols; and present the results of a small clinical experiment with the new protocol. Method: Structured survey of the literature; software development; clinical trial with one subject, submitted to ten sessions of neurofeedback (one hour each). Results: Currently there are twenty-one articles in neurofeedback for depression, among which only six present original experimental results. All of them report positive results with the technique. The most used protocols focus on Alpha inter-hemispheric asymmetry, and Theta/Beta ratio within the left prefrontal cortex. Our new protocol integrates both dimensions in a single circuit, adding to it a third programming line, which divides Beta frequencies and reinforces the decrease of Beta-3, in order to reduce anxiety. The favorable outcome of our clinical experiment, suggests that new research with this protocol is worthwhile.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chakraborty, Suvradip, Janaka Alawatugoda und Chandrasekaran Pandu Rangan. „New approach to practical leakage-resilient public-key cryptography“. Journal of Mathematical Cryptology 14, Nr. 1 (11.07.2020): 172–201. http://dx.doi.org/10.1515/jmc-2019-0014.

Der volle Inhalt der Quelle
Annotation:
AbstractWe present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce an appropriate security model for LR-NIKE protocols in the bounded memory leakage (BML) settings. We then show a secure construction of the LR-NIKE protocol in the BML setting that achieves an optimal leakage rate, i.e., 1 – o(1). Our construction of LR-NIKE requires a minimal use of a leak-free hardware component. We argue that the use of such a leak-free hardware component seems to be unavoidable in any construction of an LR-NIKE protocol, even in the BML setting. Finally, we show how to construct the aforementioned leakage-resilient primitives from such an LR-NIKE protocol as summarized below. All these primitives also achieve the same (optimal) leakage rate as the underlying LR-NIKE protocol. We show how to construct a leakage-resilient (LR) IND-CCA-2-secure PKE scheme in the BML model generically from a bounded LR-NIKE (BLR-NIKE) protocol. Our construction of LR-IND-CCA-2 secure PKE differs significantly from the state-of-the-art constructions of these primitives, which mainly use hash proof techniques to achieve leakage resilience. Moreover, our transformation preserves the leakage-rate of the underlying BLR-NIKE protocol. We introduce a new leakage model for AKE protocols, in the BML setting, and present a leakage-resilient AKE protocol construction from the LR-NIKE protocol. We introduce the first-ever leakage model for LLKE protocols in the BML setting and the first construction of such a leakage-resilient LLKE from the LR-NIKE protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Milan, Zoka, Amy Rene Gomes, Mimi R. Borrelli, Mimi R. Borrelli, Gudran Kunst und K. Katyayni. „Implementation of new protocol for pain management following cardiac surgery“. Edorium Journal of Anesthesia 6, Nr. 1 (04.03.2020): 1–9. http://dx.doi.org/10.5348/100020a05zm2020ra.

Der volle Inhalt der Quelle
Annotation:
Aims: We assessed the implementation and effectiveness of an updated protocol designed to improve pain management in cardiac surgery patients. The new updated protocol was recommended systemic pain assessment every four hours unless patients were unstable, using the numerical rating score (NRS) after the endotracheal extubation. Our secondary aim was to analyze the factors predicting patients’ postoperative pain to guide development of future pain management protocols. Methods: Fifty patients undergoing cardiac surgery with median sternotomy were evaluated in this audit. Perioperative details and details regarding analgesic administration were collected. High-risk patients were classified as ones with a history of substance misuse, chronic pain, and preoperative opioid use. Pain was measured at rest, on coughing and on moving, for the first three postoperative days (POD), using 11-point NRS (0–10). Pain was considered “unacceptable” if it was NRS ≥4 at rest, and NRS ≥8 on activity. A univariate and multivariate mixed model linear regression was used to investigate factors that may contribute to pain following cardiac surgery. Results: On POD1 38% of patients reported unacceptable pain at rest, and 27% reported unacceptable pain on coughing or moving. There was limited implementation of the new protocol, thus we cannot comment on the effectiveness of the updated protocol. Multivariate analysis demonstrated an overall significant interaction effect between postoperative day and risk (p = 0.032). It was found that high-risk patients reported pain to be greater than pain reported by low-risk patients on POD3 (2.14, CI −0.32 to 4.26, p = 0.054). Use of preoperative gabapentin did not affect pain at rest nor pain on coughing or moving (p > 0.5). Conclusion: The new pain protocol was not followed in the majority of patient cases. Preoperatively, only 25 (56%) patients received gabapentin. No patients received patient-controlled analgesia (PCA) postoperatively. Seven (15%) patients identified as high risk received no differential pharmacological management contrary to the updated protocol. It is believed that e-mail is not sufficient to implement a new protocol such as this, thus resulting in protocol implementation failure. However, it was found that postoperative pain differed between high-and low-risk patients, especially at rest. This indicates that risk assessment and individualized pain protocols are important to optimize postoperative pain management following cardiac surgery. We have discussed the efforts required to improve future protocol implementation and pain management across disciplines.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Friedrich, Lena, Joachim Krieter, Nicole Kemper und Irena Czycholl. „Animal Welfare Assessment in Sows and Piglets—Introduction of a New German Protocol for Farm’s Self-Inspection and of New Animal-Based Indicators for Piglets“. Agriculture 10, Nr. 11 (28.10.2020): 506. http://dx.doi.org/10.3390/agriculture10110506.

Der volle Inhalt der Quelle
Annotation:
We compare the Kuratorium für Technik und Bauwesen in der Landwirtschaft e.V. (KTBL) protocol, a German protocol for sows and piglets developed for farm’s self-inspection, to the Welfare Quality® protocol for sows and piglets (WQ). The KTBL protocol introduces new indicators for piglets to be assessed at pen level (face lesions, carpal joint lesions, undersized animals). The reliability of their assessment at pen level was analysed by comparison to assessments at individual level. Both protocols were applied by one observer in 65 farm visits. The protocols are highly similar, although the composition varies (WQ protocol: focus on animal-based, KTBL protocol: focus on management-based indicators). Consequently, the WQ protocol detected more welfare issues (e.g., welfare issues related to appropriate behaviour: 62.9% (WQ) vs. 21.0% (KTBL protocol)). The comparison between pen and individual level of piglets’ indicators was determined using Spearman’s rank correlation coefficient (RS), intraclass correlation coefficient (ICC) and limits of agreement (LoA). Carpal joint lesions and undersized animals (RS 0.73/0.80 ICC 0.55/0.57 LoA −0.12 to 0.03/−0.01 to 0.01) are reliably assessed at pen level but face lesions (RS 0.19 ICC 0.18 LoA −0.42 to 0.03) are not. Concluding, we present advantages and disadvantages of the KTBL protocol and introduce indicators for piglets which may enhance existing protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Yao, Gang, und Li Guo. „A New Group Key Agreement Protocol with Anonymity“. Applied Mechanics and Materials 380-384 (August 2013): 2256–61. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2256.

Der volle Inhalt der Quelle
Annotation:
Popularity of group-oriented applications motivates research on security protection for group communications. A number of group key agreement protocols have been proposed for this objective, but most current group key agreement protocols do not consider privacy protection. Group key agreement protocols for networks should also handle dynamic group membership events such as user join and leave events. The Join and Leave Protocols provide backward and forward secrecy respectively. In this paper, we proposed a new anonymous group key agreement protocol based on ID-based encryption cryptosystems. The proposed protocol not only benefits from the desirable features of ID-based cryptosystem, but also provides privacy protection for users. The proposed protocol achieves the following security attribute: anonymity, unlinkability, group key secrecy, group forward secrecy, group backward secrecy, perfect forward secrecy for the group session key and entity authentication.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "New protocol"

1

Lukovicsová, Nicola. „The history of diplomatic protocol with the emphasis on French influence on diplomatic protocol and new cultural influences on today´s diplomatic protocol“. Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193888.

Der volle Inhalt der Quelle
Annotation:
The Master's Thesis on "The History of Diplomatic Protocol with the Emphasis on French Influence on Diplomatic Protocol and New Cultural Influences on Today's Diplomatic Protocol" aims at introducing the topic of History of Diplomatic protocol and is further elaborating on the topic in terms of various influences on Diplomacy and Diplomatic protocol. The purpose was to show that the evolution of the practices, protocols and etiquette is a gradual process of change. Nowadays we live in the world strongly influenced by the European tradition that mainly comes from France. However, the changing world and process of globalization makes it easier for people to interact, share their values and spread their ideas.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Redden, Toby Lynn. „New Referral Hepatitis C Protocol: The New Standard“. Diss., North Dakota State University, 2014. https://hdl.handle.net/10365/27581.

Der volle Inhalt der Quelle
Annotation:
The Gastroenterology (GI) clinic at Sanford Health anticipates an increase in patients with hepatitis C virus (HCV) based on the 2012 Centers for Disease Control (CDC) screening recommendations. With a disproportionately high prevalence in the baby-boomer population, 75% of all documented HCV cases, the CDC recommended a ?one-time testing of all persons born during 1945-1965 without prior ascertainment of HCV risk? (CDC, 2012a). The purpose of this practice improvement project was to refine the existing workflow of the GI clinic when caring for and managing patients with HCV. The Plan, Do, Study, Act method was followed to improve the processes and address the clinic goals. The project first assessed the existing referral protocol for hepatitis C to improve the quality of care for HCV patients, to increase the clinic?s efficiency, and to identify opportunities for improvement. HCV is a complicated, intense disease process, necessitating chart reviews, patient education, and depression monitoring. To meet these time commitments the department added a new role, the designated hepatitis C nurse. The hepatitis C nurse would serve as a liaison for all HCV patients and providers. The assessment further identified an incomplete process within the referral system. During the pre-appointment chart review for new hepatitis C referrals, many required tests were incomplete. To address the gap with referrals from primary care, a brochure containing a hepatitis C screening algorithm was created. The assessment also identified a need for depression monitoring. To provide safe, up-to-date, treatment monitoring for depression in patients, the Patient Health Questionnaire (PHQ-9) was implemented. The inclusion of PHQ-9 monitoring by the hepatitis C nurse has helped the GI clinic reach its goals for administration compliance. iv Staff members and providers have reported positive impacts at the clinic after the implementation of the new change processes at the GI clinic. Patients have expressed positive satisfaction with the services, particularly the ease of communicating with the GI clinic and consistent personnel since the implementation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Talkington, Gregory Joshua. „Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis“. Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.

Der volle Inhalt der Quelle
Annotation:
The solutions presented in this dissertation describe a new paradigm in which we shepherd these network security protocols through atmosphere transitions, offering new ways to analyze and monitor the state of the protocol. The approach involves identifying a protocols transitional weaknesses through adaption of formal models, measuring the weakness as it exists in the wild by statically analyzing applications, and show how to use network traffic analysis to monitor protocol implementations going into the future. Throughout the effort, we follow the popular Open Authorization protocol in its attempts to apply its web-based roots to a mobile atmosphere. To pinpoint protocol deficiencies, we first adapt a well regarded formal analysis and show it insufficient in the characterization of mobile applications, tying its transitional weaknesses to implementation issues and delivering a reanalysis of the proof. We then measure the prevalence of this weakness by statically analyzing over 11,000 Android applications. While looking through source code, we develop new methods to find sensitive protocol information, overcome hurdles like obfuscation, and provide interfaces for later modeling, all while achieving a false positive rate of below 10 percent. We then use network analysis to detect and verify application implementations. By collecting network traffic from Android applications that use OAuth, we produce a set of metrics that when fed into machine learning classifiers, can identify if the OAuth implementation is correct. The challenges include encrypted network communication, heterogeneous device types, and the labeling of training data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wu, Chen. „A new TCP protocol based on end-to-end available bandwidth measurement /“. View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Horn, Stacey Lynn. „Evaluation of a new standardized modified ramp protocol : the modified BSU ramp protocol“. Virtual Press, 1999. http://liblink.bsu.edu/uhtbin/catkey/1129626.

Der volle Inhalt der Quelle
Annotation:
The purpose of this study was to develop a prediction equation for peak oxygen uptake using the Modified BSU Ramp protocol. Thirty-four subjects (14 men and 20 women, age 32-83 years) completed the standard Ball State University Adult Physical Fitness Program quiet and exercise testing sessions, with the maximal exercise test conducted with the Modified BSU Ramp protocol. The modified ramp protocol increases speed and grade every 20 seconds, and it increases by - 0.15 METs every increment for the first 6 minutes and --0.3 METs per increment thereafter. The Modified BSU ramp protocol was developed to allow for reasonable exercise test times from a standardized ramp protocol with individuals with low functional capacities < 10 METs. Pre-test procedures included height and weight measurements, resting blood pressure, resting heart rate, body fat measures, a blood lipid profile, and resting electrocardiogram (ECG). Exercise testing included ECG, heart rate, and blood pressure that were recorded prior to, during, and in the recovery phase of exercise. Subjects were instructed to continue exercise until fatigue, and respiratory gases were collected to determine V02 . Data was then analyzed using multiple regression techniques. Gender, age, body weight, and treadmill test time were the significant predictors, which were used in the regression equation (R2 = 0.586, SEE = 3.54 ml-kg-'.min'). An equation was developed from the lone predictor, treadmill test time with R2 = .37 and SEE = 4.1 ml•kg'•min'. The equation is as follows: VOA = 4.932 + 1.934 (test time (min)). Of the tests conducted on the Modified BSU ramp protocol, 82% were within an "ideal" test time window of 812 minutes, and 97% were within an "acceptable" test time window of 6-15 minutes. In conclusion, VOA can be estimated with acceptable accuracy (i.e. SEE - ± I MET) from the Modified BSU Ramp protocol, and for clinical purposes it is a suitable protocol to use when testing low fit individuals.
School of Physical Education
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Tudorache, Ion Gabriel. „Peripheral Routing Protocol : a new routing protocol proposal for a realistic WSN mobility model“. Thesis, University of Leeds, 2014. http://etheses.whiterose.ac.uk/7871/.

Der volle Inhalt der Quelle
Annotation:
Wireless sensor networks (WSNs) are changing our way of life just as the internet has revolutionized the way people communicate with each other. Future wireless networks are envisioned to be robust, have simple and efficient communication between nodes and self-organizing dynamic capabilities. When new nodes join in, a self-configuring network has to have the ability to include these nodes in its structure in real time, without human or machine interference. The need for a destination node (D) which moves at the periphery of wireless sensor networks can be argued from different points of view: the first is that different WSN scenarios require data gathering in such a way; the second point is that this type of node movement maximizes network lifetime because it offers path diversity preventing the case where the same routes are used excessively. However the peripheral movement model of the mobile destination does not resemble any mobility models presented in the WSN literature. In this thesis a new realistic WSN sink mobility model entitled the “Marginal Mobility Model” (MMM) is proposed. This was introduced for the case when the dynamic destination (D), moving at the periphery, frequently exits and enters the WSN coverage area. We proved through Qualnet simulations that current routing protocols recommended for Mobile Ad Hoc Networks (MANETs) do not support this sink mobility model. Because of this, a new routing protocol is proposed to support it called the Peripheral Routing Protocol (PRP). It will be proven through MATLAB simulations that, for a military application scenario where D’s connectivity to the WSN varies between 10%-95%, compared with the 100% case, PRP outperforms routing protocols recommended for MANETs in terms of throughput (T), average end to end delay (AETED) and energy per transmitted packet (E). Also a comparison will be made between PRP and Location-Aided Routing (LAR) performance when D follows the MMM. Analytical models for both PRP and LAR are proposed for T and E. It is proved through MATLAB simulations that, when compared with LAR, PRP obtains better results for the following scenarios: when the WSN size in length and width is increased to 8000 m and one packet is on the fly between sender and sink, PRP sends 103% more data and uses 84% less energy; when more data packets are on the fly between sender and sink, PRP sends with 99.6% more data packets and uses 81% less energy; when the WSN density is increased to 10,000 nodes PRP uses 97.5% less energy; when D’s speed in increased to 50 Km/h, PRP sends 74.7% more data packets and uses 88.4% less energy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Shivarudraiah, Ranjitha. „STCP: A New Transport Protocol for High-Speed Networks“. Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/67.

Der volle Inhalt der Quelle
Annotation:
Transmission Control Protocol (TCP) is the dominant transport protocol today and likely to be adopted in future high‐speed and optical networks. A number of literature works have been done to modify or tune the Additive Increase Multiplicative Decrease (AIMD) principle in TCP to enhance the network performance. In this work, to efficiently take advantage of the available high bandwidth from the high‐speed and optical infrastructures, we propose a Stratified TCP (STCP) employing parallel virtual transmission layers in high‐speed networks. In this technique, the AIMD principle of TCP is modified to make more aggressive and efficient probing of the available link bandwidth, which in turn increases the performance. Simulation results show that STCP offers a considerable improvement in performance when compared with other TCP variants such as the conventional TCP protocol and Layered TCP (LTCP).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

ROSEMBERG, MARCIO RICARDO. „SRAP: A NEW AUTHENTICATION PROTOCOL FOR SEMANTIC WEB APPLICATIONS“. PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2014. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=24515@1.

Der volle Inhalt der Quelle
Annotation:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Normalmente, aplicações semânticas utilizam o conceito de linked data, onde é possível obter dados de diversas fontes e em múltiplos formatos. Desta forma, as aplicações semânticas processam muito mais dados do que as aplicações tradicionais. Uma vez que nem todas as informações são públicas, alguma forma de autenticação será imposta ao usuário. Consultar dados de múltiplas fontes pode requerer muitos pedidos de autenticação, normalmente através de uma combinação de conta de usuário e senha. Tais operações consomem tempo e, considerando-se o tempo extra que uma aplicação semântica leva para processar os dados coletados, pode tornar a experiência frustrante e incômoda para os usuários, devendo ser minimizado, sempre que possível. O propósito desta dissertação é o de analisar e comparar as técnicas de autenticação disponíveis para as aplicações semânticas e propor um protocolo mais rápido e mais seguro para autenticação em aplicações semânticas.
Usually, Linked Data makes Semantic Web Applications query much more information for processing than traditional Web applications. Since not all information is public, some form of authentication may be imposed on the user. Querying data from multiple data sources might require many authentication prompts. Such time consuming operations, added to the extra amount of time a Semantic Web application needs to process the data it collects might be frustrating to the users and should be minimized. The purpose of this thesis is to analyze and compare several Semantic Web authentication techniques available, leading to the proposal of a faster and more secure authentication protocol for Semantic Web Applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sivada, Siva Rupesh. „A new multicasting protocol based on modified reverse path forwarding /“. Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1797219891&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Nikolaev, Ruslan. „A New QoS Routing Protocol for Mobile Ad-hoc Network“. Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1796121001&sid=2&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "New protocol"

1

Huitema, Christian. IPv6--the new Internet protocol. Upper Saddle River, N.J: Prentice Hall PTR, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

IPv6--the new Internet protocol. 2. Aufl. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

New Zealand. Ministry for the Environment., Hrsg. New Zealand urban design protocol. Wellington: Ministry for the Environment, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Simon, Hank. Wireless application protocol: The new Internet standard for wireless application development. Charleston, SC: Computer Technology Research, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

New Zealand. Ministry of Health., Hrsg. National protocol for methadone treatment in New Zealand. [New Zealand]: Ministry of Health, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Halo: The Cole Protocol. New York: Tor, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Tauroa, Hiwi. Te marae: A guide to customs & protocol. Birkenhead, Auckland: Reed Books, 1986.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mollo, J. K. Diplomacy protocol: With focus on multi-cultural new South Africa. Johannesburg: J.K. Mollo, 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Patricia, Tauroa, und Hanly Gil, Hrsg. Te marae: A guide to customs & protocol. Auckland: Reed Methuen, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Yan, Shuqian. Implementation and evaluation of QoSMIC: A new internet multicast routing protocol. Ottawa: National Library of Canada, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "New protocol"

1

Okazaki, Naonobu, Mi Rang Park, Kaoru Takahashi und Norio Shiratori. „A New Test Sequence Generation Method for Interoperability Testing“. In Protocol Test Systems, 243–58. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34883-4_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jaén, Tomás F. Fernandez, und Pedro Guillén García. „New Protocol for Muscle Injury Treatment“. In Sports Injuries, 887–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-15630-4_114.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Gong, ShengWen. „A New Formal Communication Protocol Model“. In Advances in Intelligent and Soft Computing, 629–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29390-0_100.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bhutta, Muhammad Nasir Mumtaz, und Haitham Cruickshank. „A New Dynamic Multilayer IPSec Protocol“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 119–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36787-8_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Boualam, Soukayna Riffi, und Abdellatif Ezzouhairi. „New Objective Function for RPL Protocol“. In Embedded Systems and Artificial Intelligence, 681–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0947-6_64.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Alouache, Lylia, Nga Nguyen, Makhlouf Aliouat und Rachid Chelouah. „New Robust Protocol for IoV Communications“. In Challenges of the Internet of Things, 137–63. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549765.ch7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kim, Chong Hee, und Pil Joong Lee. „New Key Recovery in WAKE Protocol“. In Public Key Cryptography, 325–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44586-2_24.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Papazis, Kon, Naveen K. Chilamkurti und Ben Soh. „A New Adaptive Layered Multicast Protocol“. In Lecture Notes in Computer Science, 381–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25969-5_34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kim, Soon-gohn, und Heau-jo Kang. „A New Secure Oblivious Transfer Protocol“. In Computational Science and Its Applications - ICCSA 2006, 690–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751649_76.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Maffei, Ivo, und Andrew W. Roscoe. „Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding“. In Financial Cryptography and Data Security, 94–111. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47754-6_6.

Der volle Inhalt der Quelle
Annotation:
AbstractWe propose a new fair exchange protocol that takes advantage of delay encryption and commutative encryption to achieve optimal partial fairness among all protocols involving one-way messages. Our protocol consists of 3 setup messages and $$2N+1$$ 2 N + 1 exchange messages and it is fair against covert adversaries with probability $$1- \frac{1}{2N}$$ 1 - 1 2 N . We prove that this is optimal up to shortening the setup phase which is notably more efficient than existing protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "New protocol"

1

Zhang, Rui. „A new dynamic contract net protocol“. In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013964.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Tan, Yang, und Bo Lv. „Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections“. In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.

Der volle Inhalt der Quelle
Annotation:
In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality (PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency (linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited (more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct result of the test data. Since the original paper lacks of experimental results to verify the protocol's correctness, we looked deeper into the protocol and found out it made a fundamental mistake. Needless to say, its correctness analysis and security proof are also wrong. In this paper, we will point out this PSI-CA protocol's mistakes, and provide the correct version of this protocol as well as the PSI protocol developed from this protocol. We also present a new security proof and some experimental results of the corrected protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Nomura, Takizuka, Kiriyama, Maruyama und Yamamoto. „New Protocol Architecture Asel“. In 1998 International Conference on Consumer Electronics. IEEE, 1998. http://dx.doi.org/10.1109/icce.1998.678312.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Qing-gui, Hu. „The new IPv6 security protocol-limited transmission protocol“. In 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS). IEEE, 2017. http://dx.doi.org/10.1109/eiis.2017.8298705.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Dizaj, Mohammad Vahid Alizadeh, Reza Askari Moghaddam und Samad Momenebellah. „New mobile payment protocol: Mobile pay center protocol 2 (MPCP2) by using new key agreement protocol: VAM“. In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim). IEEE, 2011. http://dx.doi.org/10.1109/pacrim.2011.6032860.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Dizaj, Mohammad Vahid Alizadeh. „New mobile payment protocol: Mobile pay center protocol 4 (MPCP4) by using new key agreement protocol: VAC2“. In 2011 3rd International Conference on Electronics Computer Technology (ICECT). IEEE, 2011. http://dx.doi.org/10.1109/icectech.2011.5941657.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dizaj, Mohammad Vahid Alizadeh, Reza Askari Moghaddam und Samad Momenebellah. „New mobile payment protocol: Mobile pay center protocol (MPCP)“. In 2011 3rd International Conference on Electronics Computer Technology (ICECT). IEEE, 2011. http://dx.doi.org/10.1109/icectech.2011.5941658.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wang, Hao, Yuyi Ou, Jie Ling, Xiang Xu und Heqing Guo. „A New Certified Email Protocol“. In 18th International Conference on Database and Expert Systems Applications (DEXA 2007). IEEE, 2007. http://dx.doi.org/10.1109/dexa.2007.117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wang, Hao, Yuyi Ou, Jie Ling, Xiang Xu und Heqing Guo. „A New Certified Email Protocol“. In 18th International Conference on Database and Expert Systems Applications (DEXA 2007). IEEE, 2007. http://dx.doi.org/10.1109/dexa.2007.4312981.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Nguyen, Trong Khanh, Nicolas Marilleau, Tuong Vinh Ho und Amal El Fallah. „New protocol supporting collaborative simulation“. In the Second Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2069216.2069244.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "New protocol"

1

Keates, S. Chapter 15: Commercial New Construction Protocol. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1158443.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Harrington, D. Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions. RFC Editor, November 2009. http://dx.doi.org/10.17487/rfc5706.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Polk, J. IANA Registration of New Session Initiation Protocol (SIP) Resource-Priority Namespaces. RFC Editor, März 2009. http://dx.doi.org/10.17487/rfc5478.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Palacz, Artur, Maciej Telszewski, Toste Tanhua und Emma Heslop. Marine Plastics EOV and common sampling protocol. EuroSea, 2022. http://dx.doi.org/10.3289/eurosea_d1.5.

Der volle Inhalt der Quelle
Annotation:
This deliverable describes the process of establishing global coordination for sustained observations of marine plastics litter as a new type of Essential Ocean Variable (EOV) addressing the aspect of observing human impacts on the ocean. The document reports on the EuroSea efforts to implement a community vision for an Integrated Marine Debris Observing System (IMDOS) as a new element of the Global Ocean Observing System (GOOS). First version of the Marine Plastics Litter EOV Specification Sheet is included. Progress towards establishing common sampling protocols for marine plastic litter in Europe and beyond are described.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Holmberg, C., und J. Axell. IANA Registration of New Session Initiation Protocol (SIP) Resource-Priority Namespace for Mission Critical Push To Talk Service. RFC Editor, März 2017. http://dx.doi.org/10.17487/rfc8101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kurnik, Charles W., und Steven Keates. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Office of Scientific and Technical Information (OSTI), Oktober 2017. http://dx.doi.org/10.2172/1399359.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Shamblin, Robert, Kevin Whelan, Mario Londono und Judd Patterson. South Florida/Caribbean Network early detection protocol for exotic plants: Corridors of invasiveness. National Park Service, Juli 2022. http://dx.doi.org/10.36967/nrr-2293364.

Der volle Inhalt der Quelle
Annotation:
Exotic plant populations can be potentially catastrophic to the natural communities of South Florida. Aggressive exotics such as Brazillian Pepper (Schinus terebinthifolius) and Melaleuca (Melaleuca quinquinervia) have displaced native habitats and formed monocultures of exotic stands (Dalrymple et al. 2003). Nearby plant nurseries, especially the ones outside the boundaries of Biscayne National Park (BISC) and Everglades National Park (EVER), are a continuous source of new exotic species that may become established within South Florida’s national parks. Early detection and rapid response to these new species of exotic plants is important to maintaining the integrity of the parks’ natural habitats and is a cost-effective approach to management. The South Florida/Caribbean Network (SFCN) developed the South Florida/Caribbean Network Early Detection Protocol for Exotic Plants to target early detection of these potential invaders. Three national parks of South Florida are monitored for invasive, exotic plants using this protocol: Big Cypress National Preserve (BICY), Biscayne National Park (BISC), and Everglades National Park (EVER). These national parks include some 2,411,000 acres (3,767.2 square miles [mi2]) that encompass a variety of habitat types. To monitor the entire area for new species would not be feasible; therefore the basic approach of this protocol is to scan major “corridors of invasiveness,” e.g., paved and unpaved roads, trails, trail heads, off road vehicle (ORV) trails, boat ramps, canals, and campgrounds, for exotic plant species new to the national parks of South Florida. Sampling is optimized using a two- to three-person crew: a trained botanist, a certified herbicide applicator, and optionally a SFCN (or IPMT [Invasive Plant Management Team]) staff member or park staff to take photographs and help with data collection. If infestations are small, they are treated immediately by the herbicide applicator. If large, they are reported to park staff and the Invasive Plant Management Team. The sampling domain is partitioned into five regions, with one region sampled per year. Regions include the terrestrial habitats of Biscayne National Park, the eastern region of Everglades National Park, the western region of Everglades National Park, the northern region of Big Cypress National Preserve, and the southern region of Big Cypress National Preserve. Monitoring of roads, trails, and canals occurs while traveling into and through the parks (i.e., travel at 2–10 mph) using motorized vehicles, airboats, and/or hiking. Campgrounds, boat launches, trailheads, and similar areas, involve complete searches. When an exotic plant is observed, a GPS location is obtained, and coordinates are taken of the plant. Photographs are not taken for every exotic plant encountered, but photographs will be taken for new and unusual species (for example a coastal exotic found in inland habitats). Information recorded at each location includes the species name, size of infestation, abundance, cover class, any treatment/control action taken, and relevant notes. During the surveys, a GPS “track” is also recorded to document the areas surveyed and a field of view is estimated. Field notes, pictures, and GPS data are compiled, entered, and analyzed in a Microsoft Access database. Resource briefs (and optional data summary reports) and associated shapefiles and data are then produced and sent to contacts within the corresponding national parks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Purba, Abdul, Saraswati Gumilang, Dhihintia Jiwangga, Nurina Hasanatuludhhiyah und Maarten Postma. Cost and clinical outcomes in the use of new oral anticoagulants versus warfarin in deep vein thrombosis: A systematic review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, Dezember 2022. http://dx.doi.org/10.37766/inplasy2022.12.0106.

Der volle Inhalt der Quelle
Annotation:
Review question / Objective: What are the benefits of using new oral anticoagulants compared to warfarin in terms of efficacy, bleeding, and cost among people with deep vein thrombosis? This study aimed to compare the effectiveness, bleeding incidence, and cost between NOAC and warfarin in DVT patients. Condition being studied: The patient confirmed DVT with the results of the Wells' score and D-dimer test stating "possible DVT" and followed by an ultrasound examination which stated "DVT positive". Patients are taking oral anticoagulants to treat DVT or to prevent a recurrence. Oral anticoagulants consist of apixaban, rivaroxaban, edoxaban, dabigatran, and warfarin.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Onikzeh, Parinaz, Afshin Heidari, Aida Kazemi, Parisa Najjariasl, Kamran Dalvandi, Hamidreza Sadeghsalehi und Hadi Zamanian. 3D photography versus digital planimetry in wound measurement : a systematic review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, Oktober 2021. http://dx.doi.org/10.37766/inplasy2021.10.0069.

Der volle Inhalt der Quelle
Annotation:
Review question / Objective: The aim of this study is to find whether there is concordance between two methods of wound area measurement: 3D photography and digital planimetry. Condition being studied: One of the most important factors in all types of wound management is wound measurement and two new digital techniques are : digital planimetry and 3D-photography. Eligibility criteria: the articles will be included only if the study cases would be measured by both methods of wound measurement including 3D photography and digital planimetry. patients with wound in any area of their body like diabetic ulcers, venous ulcers or burning. not models or animals.not bite or scar or bruising. without any restriction in age or gender.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Canellas, João Vitor, Luciana Drugos, Fabio Ritto, Ricardo Fischer und Paulo Jose Medeiros. What grafting materials produce greater new bone formation in maxillary sinus floor elevation surgery? A systematic review and network meta-analysis protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, Juni 2020. http://dx.doi.org/10.37766/inplasy2020.6.0106.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie