Literatura académica sobre el tema "Canaux auxiliares"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Canaux auxiliares".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Canaux auxiliares"
SIMI JUNIOR, Jacy, Hildeberto Francisco PESCE y João Marcelo Ferreira de MEDEIROS. "Eficácia de substâncias químicas auxiliares na instrumentação de canais radiculares". Revista de Odontologia da Universidade de São Paulo 13, n.º 2 (abril de 1999): 153–57. http://dx.doi.org/10.1590/s0103-06631999000200009.
Texto completoFigueirêdo Júnior, Ernani Canuto, Janaina Emanuella Galvão Menezes Almeida, Eucaé Miranda Missias, Renata Correia Sotero Dália Torres y Mônica Soares De Albuquerque. "Magnificação e ultrassom como recursos auxiliares no tratamento endodôntico em dentes com calcificação: considerações clínicas e relato de caso". ARCHIVES OF HEALTH INVESTIGATION 10, n.º 1 (26 de enero de 2021): 174–78. http://dx.doi.org/10.21270/archi.v10i1.4954.
Texto completoLi, Q., B. Xu, Y. Wang y Y. Cai. "Effects of Auxiliary Fiber Posts on Endodontically Treated Teeth With Flared Canals". Operative Dentistry 36, n.º 4 (1 de julio de 2011): 380–89. http://dx.doi.org/10.2341/10-283-l.
Texto completoO’Connor, Christopher D., Tyler Frederick, Jacek Koziarski, Victoria Baker y Kaylee Kosoralo. "Auxiliary Police Volunteer Experiences and Motivations to Volunteer in Canada". Policing: A Journal of Policy and Practice 16, n.º 1 (13 de noviembre de 2021): 152–66. http://dx.doi.org/10.1093/police/paab071.
Texto completoKeay, Brian A., Shawn P. Maddaford, Walter A. Cristofoli, Neil G. Andersen, Marco S. Passafaro, Noel S. Wilson y James A. Nieman. "1996 Merck Frosst Award Lecture Synthetic adventures along a Rocky Mountain road". Canadian Journal of Chemistry 75, n.º 9 (1 de septiembre de 1997): 1163–71. http://dx.doi.org/10.1139/v97-139.
Texto completoBélanger1, Roxanne, Chantal Mayer-Crittenden, Josée Mainguy y Anie Coutu. "Enquête sur l’offre active pour les services auxiliaires de santé du Nord-Est de l’Ontario". Reflets 24, n.º 2 (15 de noviembre de 2018): 212–47. http://dx.doi.org/10.7202/1053869ar.
Texto completoSilva, Daniela Ribeiro da y Ivaldo Gomes de Moraes. "Influence of different auxiliary agents of biomechanical preparation in the filling of "artificially prepared" lateral canals". Journal of Applied Oral Science 13, n.º 2 (junio de 2005): 147–51. http://dx.doi.org/10.1590/s1678-77572005000200010.
Texto completoDenise COSTA, Fabiana DALMINA y Luis Eduardo Duarte IRALA. "O uso do vinagre como auxiliar químico em Endodontia: uma revisão de literatura". RSBO 6, n.º 2 (30 de junio de 2010): 185–93. http://dx.doi.org/10.21726/rsbo.v6i2.1214.
Texto completoBostan, Ion, Sergiu Mazuru y Maxim Casian. "Method of axial adjustment for precessional transmissions". MATEC Web of Conferences 178 (2018): 06024. http://dx.doi.org/10.1051/matecconf/201817806024.
Texto completoCollins, Peter. "New-Dialect Formation in Canada: Evidence from the English Modal Auxiliaries by Stefan Dollinger". World Englishes 29, n.º 3 (16 de agosto de 2010): 439–42. http://dx.doi.org/10.1111/j.1467-971x.2010.01664_4.x.
Texto completoTesis sobre el tema "Canaux auxiliares"
Proy, Julien. "Sécurisation systématique d'applications embarquées contre les attaques physiques". Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLEE048.
Texto completoThe security of embedded systems containing sensitive data has become a main concern. These widely deployed devices are subject to physcial attacks, requiring protections both in hardware and software. The race for higher productivity and shorter time to market in the deployment of secure systems pushes for automatic solutions. This thesis studies the integration of software countermeasures against fault attacks in development tools, with a special focus on the compiler. The goal is to enable the automatic application, at compilation time, of a wide range of countermeasures. We propose two protection schemes against these attacks which can be automatically deployed: one scheme dedicated to loop control flow and the second dedicated to the protection of the call graph. These schemes, integrated in the LLVM compiler framework, allow to focus security application on sensitive areas of the targeted code, thus limitating the overhead. Faults that can be exploited are different from a device to another, we thus also provide an ISA-level characterization of fault effects on a superscalar processor representative of mobile phones. This work highlights the need of studying fault effects on more complex platforms, leading to the design of new protection schemes and automating their compilation-time application
Houssein, Meraneh Awaleh. "Enhancing the security of industrial cyber-physical systems trough side-channel leakage". Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2024. http://www.theses.fr/2024IMTA0402.
Texto completoIndustrial cyber-physical systems(ICPSs) have increased in industrial processes.These systems facilitate automation and operational control through physical devices, resource constrained sensors and actuators, digital software, and network connectivity. Although ICPSs have proven effective in improving efficiency levels, they are susceptible to cyber-attacks that could cause significant harm. This thesis aims to enhance the security of ICPS by using side-channel leakage. This research focuses on two key aspects. Firstly, this thesis provides effective and efficient methods to detect and mitigate anomalies in ICPS by using side-channel leakage, ensuring these systems' security and proper functioning. The study proposes a new real-time sound-based anomaly detection approach called SADIS for early and accurate detection of anomalies in ICPS. The SADIS approach addresses the limitations faced by existing methods in detecting anomalies in ICPS, including high detection time, low detection accuracy, and poor robustness to noisy data. SADIS is robust against background noise and transferable to various industrial environments, making it suitable for widespread deployment. Secondly, the thesis studies the resistance of lightweight cryptography algorithms commonly implemented in resource-constrained components of industrial systems, including sensors, actuators, and RFID devices, against side-channel analysis. We propose a theoretical attack on the Elephant algorithm's linear feedback shift registers (LFSR), a finalist in the NIST lightweight cryptography competition. By exploiting the dependence on the secret key, we demonstrate how side-channel analysis can compromise the security of Elephant. We explore possible tweaking to the Elephant algorithm as counter measures against such attacks
Goyet, Christopher. "Cryptanalyse algébrique par canaux auxiliaires". Paris 6, 2012. http://www.theses.fr/2012PA066329.
Texto completoAlgebraic Side Channel Attacks (ASCA) are a new kind of attack presented at CHES2009 by Renauld and Standaert. They showed thatside-channel information leads to effective algebraic attacks, butthese results are mostly experiments strongly based on a SAT-solver. In this talk, we will present a theoretical study which explains andcharacterizes the algebraic phase of these attacks. We study a moregeneral algebraic attack based on Grobner basis methods. We show thatthe complexity of the Grobner basis computations in these attacksdepends on a new notion of algebraic immunity that we define, and onthe distribution of the leakage information of the cryptosystem. Weillustrate this analysis by two examples of attacks on block-ciphersAES and PRESENT with usual leakage models: the Hamming weight and theHamming distance models. Finally, a new criterion for effectivealgebraic side channel attacks is defined. This easily computablecriterion unifies both SAT and Grobner attacks. This criterion alsorestricts the choice of resisting S-Box against ASCA. At CHES 2009, Renauld, Standaert and Veyrat- Charvillon introduced a new kind of attack called algebraic side-channel attacks (ASCA). They showed that side-channel information leads to effective algebraic attacks. These results are mostly experiments since strongly based on the use of a SAT solver. This article presents a theoretical study to explain and to characterize the algebraic phase of these attacks. We study more general algebraic attacks based on Gröbner meth- ods. We show that the complexity of the Gröbner basis com- putations in these attacks depends on a new notion of alge- braic immunity defined in this paper, and on the distribution of the leakage information of the cryptosystem. We also study two examples of common leakage models: the Hamming weight and the Hamming distance models. For instance, the study in the case of the Hamming weight model gives that the probability of obtaining at least 64 (resp. 130) linear relations is about 50% for the substitution layer of PRESENT (resp. AES). Moreover if the S-boxes are replaced by functions maximizing the new algebraic immunity criterion then the algebraic attacks (Gröbner and SAT) are intractable. From this theoretical study, we also deduce an invariant which can be easily computed from a given S-box and provides a suffi- cient condition of weakness under an ASCA. This new invari- ant does not require any sophisticated algebraic techniques to be defined and computed. Thus, for cryptographic engi- neers without an advanced knowledge in algebra (e. G. Gröb- ner basis techniques), this invariant may represent an inter- esting tool for rejecting weak S-boxes. We describe a lattice attack on DSA-like signature schemes under the assumption that implicit infor- mation on the ephemeral keys is known. Inspired by the implicit oracle of May and Ritzenhofen presented in the context of RSA (PKC2009), we assume that the ephemeral keys share a certain amount of bits without knowing the value of the shared bits. This work also extends results of Leadbitter, Page and Smart (CHES2004) which use a very similar type of partial information leakage. By eliminating the shared blocks of bits between the ephemeral keys, we provide lattices of small dimension (e. G. Equal to the number of signatures) and thus obtain an efficient attack. More precisely, by using the LLL algorithm, the complexity of the attack is polynomial. We show that this method can work when ephemeral keys share certain amount of MSBs and/or LSBs, as well as contiguous blocks of shared bits in the middle. Under the Gaussian heuristic assumption, theoretical bounds on the number of shared bits in function of the number of signed messages are proven. Experimental results show that we are often able to go a few bits beyond the theoretical bound. For instance, if only 2 shared LSBs on each ephemeral keys of 200 signed messages (with no knowledge about the secret key) then the attack reveals the secret key. The success rate of this attack is about 90% when only 1 LSB is shared on each ephemeral keys associated with about 400 signed messages
Dugardin, Margaux. "Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique". Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0035/document.
Texto completo: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorithms on embedded devices. Indeed, each electronic component produces physical emanations, such as the electromagnetic radiation, the power consumption or the execution time. Besides, these emanations reveal some information on the internal state of the computation. A wise attacker can retrieve secret data in the embedded device using the analyzes of the involuntary “leakage”, that is side channel attacks. This thesis focuses on the security evaluation of asymmetric cryptographic algorithm such as RSA and ECC. In these algorithms, the main leakages are observed on the modular multiplication. This thesis presents two attacks targeting the modular multiplication in protected algorithms, and a formal demonstration of security level of a countermeasure named modular extension. A first attack is against scalar multiplication on elliptic curve implemented with a regular algorithm and scalar blinding. This attack uses a unique acquisition on the targeted device and few acquisitionson another similar device to retrieve the whole scalar. A horizontal leakage during the modular multiplication over large numbers allows to detect and correct easily an error bit in the scalar. A second attack exploits the final subtraction at the end of Montgomery modular multiplication. By studying the dependency of consecutive multiplications, we can exploit the information of presence or absence of final subtraction in order to defeat two protections : regular algorithm and blinding input values. Finally, we prove formally the security level of modular extension against first order fault attacks applied on elliptic curves cryptography
Dugardin, Margaux. "Amélioration d'attaques par canaux auxiliaires sur la cryptographie asymétrique". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0035.
Texto completo: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorithms on embedded devices. Indeed, each electronic component produces physical emanations, such as the electromagnetic radiation, the power consumption or the execution time. Besides, these emanations reveal some information on the internal state of the computation. A wise attacker can retrieve secret data in the embedded device using the analyzes of the involuntary “leakage”, that is side channel attacks. This thesis focuses on the security evaluation of asymmetric cryptographic algorithm such as RSA and ECC. In these algorithms, the main leakages are observed on the modular multiplication. This thesis presents two attacks targeting the modular multiplication in protected algorithms, and a formal demonstration of security level of a countermeasure named modular extension. A first attack is against scalar multiplication on elliptic curve implemented with a regular algorithm and scalar blinding. This attack uses a unique acquisition on the targeted device and few acquisitionson another similar device to retrieve the whole scalar. A horizontal leakage during the modular multiplication over large numbers allows to detect and correct easily an error bit in the scalar. A second attack exploits the final subtraction at the end of Montgomery modular multiplication. By studying the dependency of consecutive multiplications, we can exploit the information of presence or absence of final subtraction in order to defeat two protections : regular algorithm and blinding input values. Finally, we prove formally the security level of modular extension against first order fault attacks applied on elliptic curves cryptography
Leplus, Gaëtan. "Processeur résistant et résilient aux attaques de fautes et aux attaques par canaux auxiliaires". Electronic Thesis or Diss., Saint-Etienne, 2023. http://www.theses.fr/2023STET0059.
Texto completoIn today's technological landscape, the Internet of Things (IoT) has emerged as a ubiquitous element, yet it brings major security challenges. Fault injection and side-channel attacks are of particular concern, targeting systemic weaknesses and compromising data integrity and confidentiality. Processors, as the cornerstones of computing systems, are crucial in securing the IoT.This thesis focuses on securing the processor pipeline to counter these threats. The significance of this research is highlighted by the need to develop robust security mechanisms at the processor level, the core of all computation and control. Several countermeasures are proposed to enhance the resilience of different parts of the processor against attacks.To secure the data path, an integrity tagging method is proposed. Compatible with traditional masking techniques, this method aims to ensure data integrity throughout the processing pipeline, with minimal overhead.For the instruction path, a mechanism for masking the current instruction is proposed, where a mask is generated based on the previous instruction. This innovative technique enables effective instruction security with very low overhead.Regarding the desynchronization process, it introduces a robust method for inserting dummy instructions more efficiently than current techniques.These countermeasures, by targeting key components of the processor, contribute to a notable improvement in the security of IoT systems. They address the roots of vulnerabilities, thus providing enhanced protection against a wide range of attacks
Fernandes, Medeiros Stéphane. "Attaques par canaux auxiliaires: nouvelles attaques, contre-mesures et mises en oeuvre". Doctoral thesis, Universite Libre de Bruxelles, 2015. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209096.
Texto completoDoctorat en Sciences
info:eu-repo/semantics/nonPublished
Barthe, Lyonel. "Stratégies pour sécuriser les processeurs embarqués contre les attaques par canaux auxiliaires". Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20046/document.
Texto completoSide-channel attacks such as differential power analysis (DPA) and differential electromagnetic analysis (DEMA) pose a serious threat to the security of embedded systems. The aim of this thesis is to study the side-channel vulnerabilities of software cryptographic implementations in order to create a new class of processor. For that purpose, we start by identifying the different elements of embedded processors that can be exploited to reveal the secret information. Then, we introduce several strategies that seek a balance between performance and security to protect such architectures at the register transfer level (RTL). We also present the design and implementation details of a secure processor, the SecretBlaze-SCR. Finally, we evaluate the effectiveness of the proposed solutions against global and local electromagnetic analyses from experimental results obtained with a FPGA-based SecretBlaze-SCR. Through this case study, we show that a suitable combination of countermeasures significantly increases the side-channel resistance of processors while maintaining satisfactory performance for embedded systems
Vaquié, Bruno. "Contributions à la sécurité des circuits intégrés face aux attaques par canaux auxiliaires". Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20133/document.
Texto completoSide channel attacks such as power analysis attacks are a threat to the security of integrated circuits.They exploit the physical leakage of circuits during the cryptographic computations to retrieve the secret informations they contain. Many countermeasures, including hardware, have been proposed by the community in order to protect cryptosystems against such attacks. Despite their effectiveness, their major drawback is their significant additional cost in area, speed and consumption. This thesis aims at proposing low cost countermeasures able to reduce the leaks and offering a good compromise between security and costs. First we identify the main sources of leakage of a cryptographic system that integrates an iterative hardware architecture of a symetric algorithm. Then we propose several low cost countermeasures, which aim at reducing this leakage. Finally, we evaluate the robustness of our solutions against side channel attacks
Dosso, Fangan Yssouf. "Contribution de l'arithmétique des ordinateurs aux implémentations résistantes aux attaques par canaux auxiliaires". Electronic Thesis or Diss., Toulon, 2020. http://www.theses.fr/2020TOUL0007.
Texto completoThis thesis focuses on two currently unavoidable elements of public key cryptography, namely modular arithmetic over large integers and elliptic curve scalar multiplication (ECSM). For the first one, we are interested in the Adapted Modular Number System (AMNS), which was introduced by Bajard et al. in 2004. In this system of representation, the elements are polynomials. We show that this system allows to perform modular arithmetic efficiently. We also explain how AMNS can be used to randomize modular arithmetic, in order to protect cryptographic protocols implementations against some side channel attacks. For the ECSM, we discuss the use of Euclidean Addition Chains (EAC) in order to take advantage of the efficient point addition formula proposed by Meloni in 2007. The goal is to first generalize to any base point the use of EAC for ECSM; this is achieved through curves with one efficient endomorphism. Secondly, we propose an algorithm for scalar multiplication using EAC, which allows error detection that would be done by an attacker we detail
Libros sobre el tema "Canaux auxiliares"
Québec (Province). Ministère des forêts., ed. Entente auxiliaire Canada-Québec sur le développement forestier. [Québec]: Gouvernement du Québec, Ministère des forêts, 1992.
Buscar texto completoDollinger, Stefan. New-dialect formation in Canada: Evidence from the English modal auxiliaries. Amsterdam: John Benjamins Pub., 2008.
Buscar texto completorégionale, Canada Ministère de l'expansion industrielle. Entente Auxiliaire Canada-Québec sur le Développement Touristique 1985-1990. S.l: s.n, 1985.
Buscar texto completo(Province), Québec, ed. Entente auxiliaire Canada-Québec sur le développement touristique au Québec. [Ottawa: Govt. of] Canada, 1992.
Buscar texto completoCanada. Ministère de l'expansion industrielle régionale. Entente Auxiliaire Canada-Québec sur le Développement des Entreprises de Communication 1984-1990. S.l: s.n, 1985.
Buscar texto completo(Province), Québec y Québec (Province). Ministère des communications. Direction des communications., eds. Entente auxiliaire Canada-Québec sur le développement des entreprises de communication 1985-1990: Les programmes d'aide. 2a ed. [Québec]: Direction des communications du Ministère des communications du Québec, 1987.
Buscar texto completoMaluzynsky, Patrece. A labour of love: A 50 year history of St. Andrew's Ukrainian Orthodox Ladies Auxiliary. Edmonton: St. Andrew's Ukrainian Orthodox Ladies Auxiliary, 2011.
Buscar texto completoEntente auxiliaire spéciale Canada-Québec sur le développement forestier de la Haute-Côte-Nord. Entente auxiliaire spéciale Canada-Québec sur le développement forestier de la Haute-Côte-Nord (1987-1992): Rapport final. Québec, Qué: Ministère des ressources naturelles, 1996.
Buscar texto completoBélanger, Éric. Évaluation du volet recherche et développement de l'entente auxiliaire Canada-Québec sue le développement des transports / Éric Bélanger. [Québec, Québec: Gouvernement du Québec, Ministère des transports, 1992.
Buscar texto completoMurray, Sylvie. À la jonction du mouvement ouvrier et du mouvement des femmes: La ligue auxiliare de l'association internationale des machinistes, Canada, 1903-1980. [Montréal?]: Regroupement des chercheurs-chercheures en histoire des travailleurs et travailleuses du Québec, 1990.
Buscar texto completoCapítulos de libros sobre el tema "Canaux auxiliares"
Parent, Rick. "Auxiliary and Reserve Constables in Canada". En Police Reserves and Volunteers, 127–37. New York: Routledge, 2017. http://dx.doi.org/10.4324/9781315367460-12.
Texto completoFerreira, Antônio Fabricio Alves, Leandro Rodrigues de Sena, Samara de Freitas Guimarães, Andres Felipe Millan Cardenas, Fabiana Suelen Figuerêdo de Siqueira, Rossana Aboud Matos de Almeida, Gustavo Leon Oliveira Soares et al. "EFICÁCIA DOS METÓDOS AUXILIARES NA IRRIGAÇÃO DO SISTEMA DE CANAIS RADICULARES: UMA REVISÃO DE LITERATURA". En Tópicos da odontologia aplicada - Volume 6. Editora Pascal LTDA, 2024. http://dx.doi.org/10.29327/5391781.1-1.
Texto completoParent, Rick. "Auxiliary and Reserve Constables in Canada". En Police Reserves and Volunteers, 127–37. Routledge, 2017. http://dx.doi.org/10.1201/9781315367460-13.
Texto completoAraújo, Cibelly Mara Pereira, Ana Carolina Duarte Corlaitti Duarte, Thais Martins Jajah Carlos, Mariana Alves Rossi Faleiros, Glaciele Maria de Souza, Warley Silva de Oliveira, Túlio Bruno Cavalhero de Oliveira, Renata Pereira Georjutti y Débora Souto-Souza. "Use of calcium hydroxide as an intracanal medication in permanent teeth: A brief review of the literature". En Current Challenges in Dentistry: Theory and Clinical Practice. Seven Editora, 2024. http://dx.doi.org/10.56238/sevened2023.005-010.
Texto completoWeddle, Kevin J. "Laying the Groundwork". En The Compleat Victory:, 86–101. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780195331400.003.0006.
Texto completoFranses, Philip Hans. "An Introduction to Seasonal Time Series". En Periodicity and Stochastic Trends In Economic Time Series, 32–48. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780198774532.003.0003.
Texto completoSouza, Simone Silva Frutuoso De. "REALIDADE VIRTUAL APLICADA COMO FERRAMENTA DE ENSINO-APRENDIZADO NA DISCIPLINA DE BIOLOGIA". En Open Science Research XI, 545–59. Editora Científica Digital, 2023. http://dx.doi.org/10.37885/230312364.
Texto completoSilva, Clara Iasmim Aparecida Souza e., Ana Beatriz Hermínia Ribeiro Ducati de Sampaio, Caio Vinicius Teixeira Nogueira, Eliane Maria Gonçalves Moreira de Vasconcelos, Jéssica Christie Souza e. Silva, Layanna Leite Pinto Macêdo, Luane Cristina Fernandes Teixeira y Cicero Lucas Gomes Ramalho. "EFEITOS DA OZONIOTERAPIA COMO MÉTODO COADJUVANTE NA DESINFECÇÃO DOS CANAIS RADICULARES". En Atualidades em Medicina e Saúde, 9–24. Inove Primer, 2024. http://dx.doi.org/10.29327/5399445.1-1.
Texto completoHewitt, Nancy A. "Worldly Associations, 1836–1841". En Radical Friend, 65–90. University of North Carolina Press, 2018. http://dx.doi.org/10.5149/northcarolina/9781469640327.003.0004.
Texto completoFreitas, Lara Brunelle Almeida, Fabiana Faxina y Marcus Aurelius de Oliveira Vasconcelos. "AJU INTELLIGENCE TOUR: UM APLICATIVO PARA O TURISMO INTELIGENTE NA CIDADE DE ARACAJU (SERGIPE - BRASIL)". En Estudos em Turismo: Desafios e Caminhos, 185–208. 2a ed. Ópera, 2023. http://dx.doi.org/10.29327/5398227.2-1.
Texto completoActas de conferencias sobre el tema "Canaux auxiliares"
Martins, Eliane. "Um Sistema de Comunicação para Ambiente de Multiprocessadores". En Simpósio Brasileiro de Arquitetura de Computadores e Processamento Paralelo. Sociedade Brasileira de Computação, 1987. http://dx.doi.org/10.5753/sbac-pad.1987.23558.
Texto completode Oliveira, Francisco Kelsen, José Rogério Santana y Maria Gilvanise de Oliveira Pontes. "O vídeo pela Internet como ferramenta educacional". En Workshop de Informática na Escola. Sociedade Brasileira de Computação - SBC, 2010. http://dx.doi.org/10.5753/wie.2010.25414.
Texto completoCarvalho, Dárlinton y Samuel Moreira Abreu Araújo. "Fotossenti: Um aplicativo para auxiliar em tratamentos psicológicos". En XI Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2015. http://dx.doi.org/10.5753/sbsi.2015.5855.
Texto completoSilva, Sandro Matheus Albuquerque da, Artur José da Silva, Maria Eduarda de Alencar Barreto, Bárbara Silva Gonzaga, Brenda da Silva Araújo, Eduarda Santos Silva y Bárbara Lacerda Carvalho. "A EFICÁCIA DA TERAPIA FOTODINÂMICA NO TRATAMENTO ENDODÔNTICO". En XXVII Semana de Biomedicina Inovação e Ciência. Editora IME, 2021. http://dx.doi.org/10.51161/9786588884119/12.
Texto completoMota, Fernanda, Matheus Gonçalves, Marilton Aguiar y Diana Adamatti. "Google Earth Engine e sua aplicabilidade na gestão de recursos hídricos". En Workshop de Computação Aplicada à Gestão do Meio Ambiente e Recursos Naturais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wcama.2020.11030.
Texto completoSilva, João, Tamires Silva, Marcos Lima y Ricardo Souza. "Aplicação do Design Centrado em Humano para Desenvolvimento de uma Solução de Software baseada em Informações do Tempo e Clima". En X Workshop de Computação Aplicada à Gestão do Meio Ambiente e Recursos Naturais. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wcama.2019.6425.
Texto completoJesus, Rosana, Karin Komati y Sérgio Nery Simões. "Comparação das Técnicas de Extração de Características HOG e LBP para Deteção de Glaucoma em Retinografias". En Encontro Nacional de Computação dos Institutos Federais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/encompif.2020.11071.
Texto completoWang, Meijing y Yong Fang. "Analysis on the Clinical Observation of Fentanyl Combined with Imidazole Valium Auxiliary Intra-spinal Canal Anesthesia Effect". En 2015 International Forum on Bioinformatics and Medical Engineering. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/bme-15.2015.19.
Texto completoSantos, Cleber Brito, Aline Maria Santos Andrade y Alirio Santos de Sá. "Uma análise dos tempos limite para entrega de mensagens e para determinação de vizinhança em rede veiculares ad hoc". En Workshop de Computação Urbana. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/courb.2023.799.
Texto completoMenezes, Mathias A. G. de, Ricardo Maroquio B., Erick M. Moreira, Hebert Azevedo Sá. y Paulo F. F. Rosa. "Veículos Aéreos Não Tripulados para a Vigilância de Áreas Urbanas em Cidades Inteligentes". En Workshop Brasileiro de Cidades Inteligentes. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/wbci.2022.223170.
Texto completoInformes sobre el tema "Canaux auxiliares"
Tzonev. PR-396-143702-R01 Feasibility of a Petroleum Leak Detection Cable Utilizing Polymer Absorption Sensor. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), septiembre de 2015. http://dx.doi.org/10.55274/r0010849.
Texto completoBolduc, Jolianne, Roxane Borgès Da Silva y François Vaillancourt. Gains en compétence et coûts financiers du rehaussement des différentes formations infirmières au Québec. CIRANO, junio de 2024. http://dx.doi.org/10.54932/mtda5129.
Texto completo