Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Web extensions“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Web extensions" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Web extensions"
Picazo-Sanchez, Pablo, Juan Tapiador und Gerardo Schneider. „After you, please: browser extensions order attacks and countermeasures“. International Journal of Information Security 19, Nr. 6 (21.11.2019): 623–38. http://dx.doi.org/10.1007/s10207-019-00481-8.
Der volle Inhalt der QuelleTarkiainen, Anssi, Hanna‐Kaisa Ellonen und Olli Kuivalainen. „Complementing consumer magazine brands with internet extensions?“ Internet Research 19, Nr. 4 (14.08.2009): 408–24. http://dx.doi.org/10.1108/10662240910981371.
Der volle Inhalt der QuelleTer Louw, Mike, Jin Soon Lim und V. N. Venkatakrishnan. „Enhancing web browser security against malware extensions“. Journal in Computer Virology 4, Nr. 3 (12.01.2008): 179–95. http://dx.doi.org/10.1007/s11416-007-0078-5.
Der volle Inhalt der QuelleMarwaha, Preeti, Hema Banati und Punam Bedi. „UDDI Extensions for Temporally Customized Web Services“. Procedia Technology 10 (2013): 184–90. http://dx.doi.org/10.1016/j.protcy.2013.12.351.
Der volle Inhalt der QuelleAUGENBROE, GODFRIED, HANS VERHEIJ und GERHARD SCHWARZMÜLLER. „Project web sites with design management extensions“. Engineering, Construction and Architectural Management 9, Nr. 3 (März 2002): 259–71. http://dx.doi.org/10.1108/eb021221.
Der volle Inhalt der QuelleMartin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch und Hailin Wu. „The privacy practices of Web browser extensions“. Communications of the ACM 44, Nr. 2 (Februar 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.
Der volle Inhalt der QuelleWalsh, Patrick, und Antonio Williams. „To Extend or Not Extend a Human Brand: An Analysis of Perceived Fit and Attitudes Toward Athlete Brand Extensions“. Journal of Sport Management 31, Nr. 1 (Januar 2017): 44–60. http://dx.doi.org/10.1123/jsm.2015-0314.
Der volle Inhalt der QuelleDe Sarkar, Tanmay. „The prevalence of web browser extensions use in library services: an exploratory study“. Electronic Library 33, Nr. 3 (01.06.2015): 334–54. http://dx.doi.org/10.1108/el-04-2013-0063.
Der volle Inhalt der QuelleRankin, Jeff H., und Irina Kondratova. „Mobile multimodal extensions to collaborative Web-based systems“. Canadian Journal of Civil Engineering 33, Nr. 12 (01.12.2006): 1470–79. http://dx.doi.org/10.1139/l06-096.
Der volle Inhalt der QuelleYu, Chun Mei, Jian Hua Sun, Hao Chen und Xiang Hua Xu. „Privilege Separation in Browser Extensions Based on Web Workers“. Advanced Materials Research 989-994 (Juli 2014): 4675–79. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4675.
Der volle Inhalt der QuelleDissertationen zum Thema "Web extensions"
Joelsson, Tomas. „Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications“. Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91862.
Der volle Inhalt der QuelleI dagens mobila webbläsare återfinns det mesta av funktionaliteten från webbläsare för datorer. Det som dock fortfarande saknas är möjligheten för webbapplikationer att komma åt lokala telefonfunktioner. Dagens mobiltelefoner är ofta utrustade med GPS-mottagare och digitalkameror, men dessa kan för närvarande ej nås från webbläsaren. Det enda sättet att utnyttja dessa inbyggda funktioner är genom separata applikationer, men sådana applikationer är inte lika mångsidiga som webbläsare. Om en mobil webbläsare kunde utnyttja de inbyggda funktionerna, så skulle en mobil applikation kunna köras i webbläsaren istället för att ha separat klientprogramvara. Det här examensarbetet föreslår ett sätt att ge denna möjlighet till mobila webbläsare. I den föreslagna metoden används en lokal Java-applikation för att ge tillgång till inbyggda funktioner via skript. Denna applikation fungerar som en proxy-server och låter webbläsaren anropa metoder exponerade av lokala Java-API. Både fördelar och några säkerhetsproblem med den här lösningen undersöks. Fördelarna visas ytterligare genom två exempel på webbapplikationer som utnyttjar inbyggda telefonfunktioner.
Zaccheus, Stan-Erik. „A framework for creating observable web services“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177576.
Der volle Inhalt der QuelleI underrättelsevärlden definieras en underrättelse som väsentlig information förmedlad till rätt instans vid rätt tidpunkt. Samma definition gäller för omvärldsanalys som används av regeringar och finansinstitut, patientinformation som används av vårdaktörer och metrologiska och geologiska rapporter som tillhandahålls av forskningsinstitut och miljöorganisationer. Modern mjukvaruutveckling måste lösa problem associerade med att bygga stora, komplexa och distribuerade system som på ett tillförlitligt sätt ska leverera företagsnytta i rätt tid; även den bästa förutsägelsen är utan värde om den levereras för sent. Det är absolut nödvändigt producenter i ett större system ansvarar för att publicera sitt data så att konsumenter kan agera med så lite ledtid som möjligt. Vid användande av vanliga webtjänster måste klienten aktivt fråga om ny data finns tillgänglig. I ett system med många användare slösas resurser på att hantera statusefterfrågningar. Istället för att klienten interagerar interaktivt med tjänsten, borde den istället reagera reaktivt. Med den reaktiva programmeringsmodellen stöds systemkonstruktion med dessa egenskaper. På .NET-plattformen tillhandahåller kodbiblioteket Reactive Extensions funktionalitet för att skapa reaktiva applikationer genom skapandet av funktioner som arbetar med asynkrona händelseströmmar. Biblioteket tillhandahåller kraftfulla verktyg för utformningen av reaktiva program, dock innehåller den inte en abstraktion för arbete med händelseströmmar som rör sig mellan olika processer, en nödvändighet för skapandet av distribuerade reaktiva system. Denna uppsats presenterar den bakomliggande designen och implementationen av ett ramverk för skapandet och användandet av observerbara webtjänster vars syfte är att brygga händelseströmmar mellan olika processer. Lösningen är baserad på en konceptuell modell som bygger på arkitekturen för webbtjänster. Den är implementerad som ett ramverk som består av två delar; en tjänstekomponent som används för att skapa observerbara webbtjänster och klientkomponent som ansluter till en observerbar webbtjänst och genererar kod som används för att prenumerera på händelser som exponeras av denna tjänst. Prenumerationsfunktionaliteten är skapad för att fungera med Reactive Extensions och gör det möjligt att bygga reaktiva och distribuerade system. Integrationstest används för att kontrollera att ramverket uppfyller de krav som anges för den konceptuella modellen.
Jarosch, Dennis. „Effects and opportunities of native code extensions for computationally demanding web applications“. Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2012. http://dx.doi.org/10.18452/16451.
Der volle Inhalt der QuelleThe World Wide Web is amidst a transition from interactive websites to web applications. An increasing number of users perform their daily computing tasks entirely within the web browser, turning the Web into an important platform for application development. The Web as a platform, however, lacks the computational performance of native applications. This problem has motivated the inception of Microsoft Xax and Google Native Client (NaCl), two independent projects that facilitate the development of native web applications. These allow the extension of conventional web applications with compiled native code, while maintaining operating system portability. This dissertation determines the benefits and drawbacks of native web applications. It also examines the actual performance capabilities of JavaScript web applications. An experimental performance analysis is undertaken in order to determine and compare the performance characteristics of native C applications, JavaScript web applications, and NaCl native web applications. Four application benchmarks consider different performance aspects: number crunching (serial and parallel), 3D graphics performance, and data processing. The results confirm that NaCl''s performance in computational tasks and 3D graphics is impeccable. On the other hand, it shows substantial limitations in data processing. These are evaluated and possible solutions are discussed. The results of the performance analysis are complemented with an evaluation on the basis of technical and non-technical criteria and a discussion of the technical, political, and strategic drivers for NaCl.
Dodda, Srinivasa Rao. „Improvements and extensions of a web-tool for finding candidate genes associated with rheumatoid arthritis“. Thesis, University of Skövde, School of Humanities and Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-26.
Der volle Inhalt der QuelleQuantitativeTraitLocus (QTL) is a statistical method used to restrict genomic regions contributing to specific phenotypes. To further localize genes in such regions a web tool called “Candidate Gene Capture” (CGC) was developed by Andersson et al. (2005). The CGC tool was based on the textual description of genes defined in the human phenotype database OMIM. Even though the CGC tool works well, the tool was limited by a number of inconsistencies in the underlying database structure, static web pages and some gene descriptions without properly defined function in the OMIM database. Hence, in this work the CGC tool was improved by redesigning its database structure, adding dynamic web pages and improving the prediction of unknown gene function by using exon analysis. The changes in database structure diminished the number of tables considerably, eliminated redundancies and made data retrieval more efficient. A new method for prediction of gene function was proposed, based on the assumption that similarity between exon sequences is associated with biochemical function. Using Blast with 20380 exon protein sequences and a threshold E-value of 0.01, 639 exon groups were obtained with an average of 11 exons per group. When estimating the functional similarity, it was found that on the average 72% of the exons in a group had at least one Gene Ontology (GO) term in common.
Priefer, Dennis [Verfasser], und Gabriele [Akademischer Betreuer] Taentzer. „Applying Model-Driven Engineering to Development Scenarios for Web Content Management System Extensions / Dennis Priefer ; Betreuer: Gabriele Taentzer“. Marburg : Philipps-Universität Marburg, 2021. http://d-nb.info/1240383894/34.
Der volle Inhalt der QuelleSomé, Dolière Francis. „Sécurité et vie privée dans les applications web“. Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Der volle Inhalt der QuelleIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Jarosch, Dennis [Verfasser], Robert [Akademischer Betreuer] Funk und Ph D. Michael [Akademischer Betreuer] Seadle. „Effects and opportunities of native code extensions for computationally demanding web applications / Dennis Jarosch. Gutachter: Robert Funk ; Michael Seadle, Ph.D“. Berlin : Humboldt Universität zu Berlin, Philosophische Fakultät I, 2012. http://d-nb.info/1019361786/34.
Der volle Inhalt der QuelleNorberg, Tobias, Andreas Oskarsson und Martin Kling. „Web application development : a study on UML Web Application Extension“. Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1689.
Der volle Inhalt der QuelleBranderský, Gabriel. „Knihovna znovupoužitelných komponent a utilit pro framework Angular 2“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363860.
Der volle Inhalt der QuelleAlkhateeb, Faisal. „Interroger RDF(S) avec des expressions régulières“. Phd thesis, Université Joseph Fourier (Grenoble), 2008. http://tel.archives-ouvertes.fr/tel-00293206.
Der volle Inhalt der QuelleBücher zum Thema "Web extensions"
Barr, Catherine. Web assessment development assistant further extensions. [s.l: The Author], 2004.
Den vollen Inhalt der Quelle findenInc, ebrary, Hrsg. TYPO3 extension development: Developer's guide to creating feature-rich extensions using the TYPO3 API. Birmingham, UK: Packt Pub., 2008.
Den vollen Inhalt der Quelle findenSarkar, Suhreed. Joomla! 1.5 top extensions cookbook. Birmingham [England]: Packt Pub., 2010.
Den vollen Inhalt der Quelle findenRay, West, Hrsg. Building Dreamweaver 4 and Dreamweaver UltraDev 4 extensions. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Den vollen Inhalt der Quelle findenInc, ebrary, Hrsg. Joomla! 1.5 JavaScript jQuery: Enhance your Joomla! sites with the power of jQuery extensions, plugins, and more. Birmingham, U.K: Packt Pub., 2010.
Den vollen Inhalt der Quelle findenJames, Kennard, und ebrary Inc, Hrsg. Mastering Joomla! 1.5 extension and framework development: The professional guide to programming Joomla! : extend the power of Joomla! by adding components, modules, plugins, and other extensions. Birmingham, U.K: Packt Open Source, 2010.
Den vollen Inhalt der Quelle findenHeinemann, Frédéric. BSP Extensions: how to master Web reporting with HTMLB: How to use undocumented HTMLB elements ; Web application development to manage code fragments. hierarchical navigation, table selection, detail display, comprehensive search templates, and much more. Fort Lee, NJ [u.a.]: Galileo Press, 2005.
Den vollen Inhalt der Quelle findenLearning Joomla! 1.5 extension development. Birmingham: Packt, 2008.
Den vollen Inhalt der Quelle findenDreamweaver extension wang ye te xiao jue zhao. Taibei Shi: Qi feng zi xun gu fen you xian gong si, 2003.
Den vollen Inhalt der Quelle findenStauffer, Todd. The complete idiot's guide to Macintosh OS 8.5. Indianapolis, Ind: Que Alpha Books, 1998.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Web extensions"
Wootton, Cliff. „Client Browser Extensions“. In The Web Professional’s Handbook, 180–99. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-5362-4_5.
Der volle Inhalt der QuelleZakas, Nicholas C. „DOM Extensions“. In Professional Javascript® for Web Developers, 357–80. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722176.ch11.
Der volle Inhalt der QuelleKent, Allan, David Powers und Rachel Andrew. „Dreamweaver Extensions“. In PHP Web Development with Macromedia Dreamweaver MX 2004, 247–94. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0701-6_7.
Der volle Inhalt der QuelleTao, Cui, Natalya F. Noy, Harold R. Solbrig, Nigam H. Shah, Mark A. Musen und Christopher G. Chute. „Proposed SKOS Extensions for BioPortal Terminology Services“. In The Semantic Web, 342–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29923-0_23.
Der volle Inhalt der QuelleRichards, Robert. „Other XML Technologies and Extensions“. In Pro PHP XML and Web Services, 811–38. Berkeley, CA: Apress, 2006. http://dx.doi.org/10.1007/978-1-4302-0139-7_21.
Der volle Inhalt der QuelledeHaan, Jen, Peter deHaan, Simon Horwith, Curtis Hermann, Massimo Foti und Eduardo Zubler. „Dreamweaver MX 2004 Extensions“. In ColdFusion Web Development with Macromedia Dreamweaver MX 2004, 279–302. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0685-9_9.
Der volle Inhalt der QuelleAndrew, Rachel, Rob Turnbull, Alan Foley und Drew McLellan. „Dreamweaver MX 2004 Extensions“. In ASP Web Development with Macromedia Dreamweaver MX 2004, 321–46. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0722-1_8.
Der volle Inhalt der QuelleCalì, Andrea, Georg Gottlob und Thomas Lukasiewicz. „Datalog Extensions for Tractable Query Answering over Ontologies“. In Semantic Web Information Management, 249–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04329-1_12.
Der volle Inhalt der QuelleGleim, Lars, Liam Tirpitz und Stefan Decker. „HTTP Extensions for the Management of Highly Dynamic Data Resources“. In The Semantic Web, 212–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77385-4_13.
Der volle Inhalt der QuelleSydow, Marcin. „Extensions of PageRank. The RBS Algorithm“. In Intelligent Information Processing and Web Mining, 389–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-39985-8_40.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Web extensions"
Pardal, Miguel. „Core Mechanisms for Web Services Extensions“. In Third International Conference on Next Generation Web Services Practices (NWeSP'07). IEEE, 2007. http://dx.doi.org/10.1109/nwesp.2007.10.
Der volle Inhalt der QuelleAdams, Carlisle, und Sharon Boeyen. „UDDI and WSDL extensions for Web service“. In the 2002 ACM workshop. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/764792.764798.
Der volle Inhalt der QuellePerera, Srinath, und Dennis Gannon. „Enabling Web Service extensions for scientific workflows“. In 2006 Workshop on Workflows in Support of Large-Scale Science (WORKS06). IEEE, 2006. http://dx.doi.org/10.1109/works.2006.5282346.
Der volle Inhalt der QuelleVilloldo, Enric Jaen, Joan Serrat-Fernandez und Emilio Luque. „Improving Web Services Interoperability with Binding Extensions“. In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.108.
Der volle Inhalt der QuelleHobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu und Jian Huang. „Alpaca: AR Graphics Extensions for Web Applications“. In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.00036.
Der volle Inhalt der QuelleHobson, Tanner, Jeremiah Duncan, Mohammad Raji, Aidong Lu und Jian Huang. „Alpaca: AR Graphics Extensions for Web Applications“. In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2020. http://dx.doi.org/10.1109/vr46266.2020.1581207820146.
Der volle Inhalt der QuelleObimbo, Charlie, Yong Zhou und Randy Nguyen. „Analysis of Vulnerabilities of Web Browser Extensions“. In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00029.
Der volle Inhalt der QuelleSome, Doliere Francis. „EmPoWeb: Empowering Web Applications with Browser Extensions“. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00058.
Der volle Inhalt der QuelleSjösten, Alexander, Steven Van Acker und Andrei Sabelfeld. „Discovering Browser Extensions via Web Accessible Resources“. In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3029806.3029820.
Der volle Inhalt der QuelleXing, Xinyu, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci und Wenke Lee. „Understanding Malvertising Through Ad-Injecting Browser Extensions“. In WWW '15: 24th International World Wide Web Conference. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, 2015. http://dx.doi.org/10.1145/2736277.2741630.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Web extensions"
Dusseault, L., Hrsg. HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV). RFC Editor, Juni 2007. http://dx.doi.org/10.17487/rfc4918.
Der volle Inhalt der QuelleClemm, G., J. Crawford und J. Whitehead. Binding Extensions to Web Distributed Authoring and Versioning (WebDAV). Herausgegeben von J. Reschke. RFC Editor, April 2010. http://dx.doi.org/10.17487/rfc5842.
Der volle Inhalt der QuelleClemm, G., J. Amsden, T. Ellison, C. Kaler und J. Whitehead. Versioning Extensions to WebDAV (Web Distributed Authoring and Versioning). RFC Editor, März 2002. http://dx.doi.org/10.17487/rfc3253.
Der volle Inhalt der QuelleDaboo, C. CardDAV: vCard Extensions to Web Distributed Authoring and Versioning (WebDAV). RFC Editor, August 2011. http://dx.doi.org/10.17487/rfc6352.
Der volle Inhalt der QuelleWilson, D., Daniel Breton, Lauren Waldrop, Danney Glaser, Ross Alter, Carl Hart, Wesley Barnes et al. Signal propagation modeling in complex, three-dimensional environments. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40321.
Der volle Inhalt der QuelleNeves, Mateus C. R., Felipe De Figueiredo Silva und Carlos Otávio Freitas. The Effect of Extension Services and Credit on Agricultural Production in Bolivia, Peru, and Colombia. Inter-American Development Bank, Juli 2021. http://dx.doi.org/10.18235/0003404.
Der volle Inhalt der QuelleBeatty, William D., und III. Department of Defense, Inc. Are We Ready To Become An Extension of Corporate America. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada362978.
Der volle Inhalt der QuelleAvellán, Leopoldo M., Vitor Goncalves Cavalcanti, Pedro M. Garberi, Luis T. Marcano und Abraham R. Montilla. Why Is the Number of IDB Projects with Extensions beyond 24 Months Increasing?: Should We Be Concerned? Inter-American Development Bank, August 2018. http://dx.doi.org/10.18235/0001317.
Der volle Inhalt der QuelleBrianne, Selman, Brian Fauteux und Andrew deWaard. A User-Centric Case for Rights Reversions and Other Mitigations: The Cultural Capital Project Submission to ISED Consultation on Term Extension. University of Winnipeg Library, März 2021. http://dx.doi.org/10.36939/ir.202103091613.
Der volle Inhalt der QuelleAhmadi, S. Real-Time Transport Protocol (RTP) Payload Format for the Variable-Rate Multimode Wideband (VMR-WB) Extension Audio Codec. RFC Editor, Februar 2006. http://dx.doi.org/10.17487/rfc4424.
Der volle Inhalt der Quelle