Protocol

Results: 55328



#Item
161

protocol Obtaining genomes from uncultivated environmental microorganisms using FACS–based single-cell genomics Christian Rinke1, Janey Lee1, Nandita Nath1, Danielle Goudeau1, Brian Thompson2, Nicole Poulton2,

Add to Reading List

Source URL: www.microbialdarkmatter.org

Language: English - Date: 2014-09-25 01:21:09
    162

    An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-06-22 07:14:34
      163

      Greyhound Lines, Inc. Media Protocol Greyhound makes every effort to accommodate the media. We do our best to balance the needs of reporters, our customers and our employees. We care about safety and customer service. We

      Add to Reading List

      Source URL: www.greyhound.ca

      Language: English - Date: 2018-04-19 13:16:30
        164

        Common Alerting Protocol Version 1.2 OASIS Standard 01 July 2010 Specification URIs: This Version: http://docs.oasis-open.org/emergency/cap/v1.2/CAP-v1.2-os.html

        Add to Reading List

        Source URL: hflink.com

        Language: English - Date: 2012-11-14 21:36:55
          165

          Measure DNA Concentration 1. Choose DNA protocol -> enter, enter, enterChoose Dilution Factor Usually 20x for miniprep product, and 100x for maxprep product. 3. Subtract Background Blank H2Oul (miniprep,

          Add to Reading List

          Source URL: wang.eng.ucsd.edu

            166

            WIRELESS APPLICATION PROTOCOL FORUM LTD. PAGEWAP-LOCATION DRAFTING COMMITTEE CHARTER GROUP:

            Add to Reading List

            Source URL: www.wapforum.org

            Language: English - Date: 2003-07-04 22:47:02
              167

              Immunostaining Protocol 1. Prepare the cells § HeLa cells were transfected with membrane-targeted or cytosolic MT1-MMP biosensor.

              Add to Reading List

              Source URL: wang.eng.ucsd.edu

              Language: English - Date: 2017-09-15 13:59:02
                168

                A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2018-01-18 13:44:36
                  169

                  Annex 2: Protocol Implementation Conformance Statement (PICS) PICS related to performanceThe device tested is a G3-PLC CENELEC A 3-phase electricity meter communicating on 3 phases. Testing was performed on pha

                  Add to Reading List

                  Source URL: www.g3-plc.com

                  - Date: 2017-11-29 02:33:06
                    170

                    Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. SECURITY

                    Add to Reading List

                    Source URL: www.cs.jhu.edu

                    Language: English - Date: 2004-07-14 23:06:27
                      UPDATE