72 resultados para Skype, crittografia, sicurezza, intercettazioni, peer-to-peer.


Relevância:

40.00% 40.00%

Publicador:

Resumo:

L. Blot and R. Zwiggelaar, 'A volumetric approach to risk assessment in mammography: a feasibility study', Physics in Medicine and Biology 50 (4), 695-708 (2005)

Relevância:

40.00% 40.00%

Publicador:

Resumo:

L. Blot, A. Davis, M. Holubinka, R. Marti and R. Zwiggelaar, 'Automated quality assurance applied to mammographic imaging', EURASIP Journal of Applied Signal Processing 2002 (7), 736-745 (2002)

Relevância:

40.00% 40.00%

Publicador:

Resumo:

B.M. Brown, M. Marletta, S. Naboko, I. Wood: Boundary triplets and M-functions for non-selfadjoint operators, with applications to elliptic PDEs and block operator matrices, J. London Math. Soc., June 2008; 77: 700-718. The full text of this article will be made available in this repository in June 2009 Sponsorship: EPSRC,INTAS

Relevância:

40.00% 40.00%

Publicador:

Resumo:

B.M. Brown, M.S.P. Eastham, I. Wood: Conditions for the spectrum associated with a leaky wire to contain the interval [? ?2/4, ?), Arch. Math., 90, 6 (2008), 554-558

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Whelan, K. E. and King, R. D. Using a logical model to predict the growth of yeast. BMC Bioinformatics 2008, 9:97

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Eckerdal, A., McCartney, R., Mostr?m, J. E., Sanders, K., Thomas, L., and Zander, C. 2007. From Limen to Lumen: computing students in liminal spaces. In Proceedings of the Third international Workshop on Computing Education Research (Atlanta, Georgia, USA, September 15 - 16, 2007). ICER '07. ACM, New York, NY, 123-132.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mead, J., Gray, S., Hamer, J., James, R., Sorva, J., Clair, C. S., and Thomas, L. 2006. A cognitive approach to identifying measurable milestones for programming skill acquisition. SIGCSE Bull. 38, 4 (Dec. 2006), 182-194.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Fitzgerald, S., Simon, B., and Thomas, L. 2005. Strategies that students use to trace code: an analysis based in grounded theory. In Proceedings of the First international Workshop on Computing Education Research (Seattle, WA, USA, October 01 - 02, 2005). ICER '05. ACM, New York, NY, 69-80

Relevância:

40.00% 40.00%

Publicador:

Resumo:

H. Strange, W. He, E. Denton and R. Zwiggelaar, 'Cancer Risk Assessment Related to Anatomical Tissue Types', Proceedings of the Twelfth Annual Conference on Medical Image Understanding and Analysis, 2008, p.138. Sponsorship: EPSRC

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Nkiruka, A., Multiple Principles and the Obligation to Obey the Law, Deakin Law Review. Vol. 10. No. 2. 2005. p. 524 RAE2008

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Nkiruka, M., Ubuntu and the Obligation to Obey the Law, Cambrian Law Review. Vol. 37. 2006. p. 17 RAE2008

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Listening to children in the field of education: experience in Wales, (2007) 19 Child and Family Law Quarterly 161-182 pp.161-182 RAE2008

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Kohl, U. (2004). Who has the right to govern online activity? A criminal and civil point of view. International Review of Law, Computers & Technology 18 (3), 387-410 RAE2008

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Kohl, U. (2005). Ignorance is no Defence but is Inaccessibility? On the Accessibility of National Laws to Foreign Online Publishers. Information & Communities Technology Law, 14 (1), 25-41. RAE2008 Information & Communications Technology Law Volume 14, Issue 1, 2005 Special Issue: GATED COMMUNITIES

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Salmon, Naomi, 'The Internet and the Human Right to Food: The European Rapid Alert System for Food and Feed', Information and Communications Technology Law, (2005) 14 (1), pp. 43-57 Special Issue: GATED COMMUNITIES RAE2008