Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Paul A. Khoury"'
Publikováno v:
First Break. 36:43-50
Cabin Creek Field, on the southwestern flank of the Williston Basin, is one of 14 hydrocarbon fields within Cedar Creek nticline. The field was initially discovered in May 1953 and developed by Shell starting with primary production followed by water
Publikováno v:
SEG Technical Program Expanded Abstracts 2018.
Publikováno v:
SEG Technical Program Expanded Abstracts 2017.
Publikováno v:
Enterprise Information Systems
Enterprise Information Systems, Taylor & Francis, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Enterprise Information Systems, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Enterprise Information Systems, Taylor & Francis, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Enterprise Information Systems, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Recent disasters, such as Hurricane Katrina in 2005, have shown several issues for the coordination of human activities in these dynamic situations. Contemporary tools for the coordination used in the disaster response, such as e-mail, Whiteboards or
Autor:
Ayda Saidane, Massimo Felici, Alessandra Tedeschi, Carlo Riccucci, Paul El-Khoury, Magali Seguran, Nicola Zannone, Yudis Asnar, Keqin Li, Fabio Massacci
Publikováno v:
International Journal of Secure Software Engineering, 2(3), 1-22
Designing secure and dependable IT systems requires a deep analysis of organizational as well as social aspects of the environment where the system will operate. Domain experts and analysts often face security and dependability (S&D) issues they have
Publikováno v:
Artificial Intelligence and Law, 17(1), 1-30. Springer
Artificial Intelligence and Law
Artificial Intelligence and Law, Springer Verlag, 2008, 1, 17, pp.1-30. ⟨10.1007/s10506-008-9067-3⟩
Artificial Intelligence and Law
Artificial Intelligence and Law, Springer Verlag, 2008, 1, 17, pp.1-30. ⟨10.1007/s10506-008-9067-3⟩
International audience; Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technolo
Autor:
Teruo Matsumoto, Y. Ikeda, Paul A. Khoury, Mark Rummel, Caroline Grotkowski, Morris D. Kerstein, Ralph P. Ierardi
Publikováno v:
Vascular Surgery. 33:387-392
This study was conducted to determine the relative safety of early urokinase lytic therapy in expanded polytetrafluoroethylene (ePTFE) and collagen-impregnated woven velour polyester (CIWVP) grafts. Twelve mixed-breed dogs were selected and implanted
Publikováno v:
Vascular Surgery. 33:283-290
The purpose of this study was to evaluate the role of regional intraarterial thrombolytic therapy (IATT) followed by percutaneous transluminal angioplasty (PTA) in the management of acute limb-threatening ischemia. From March 1989 to July 1994, 28 of
Autor:
Scott E. Hessen, Steven P. Kutalek, March Maquilan, Audrey R. Wilson, Joseph N. Pace, Paul A. Khoury
Publikováno v:
Journal of Interventional Cardiac Electrophysiology. 1:271-279
Patients (pts) may present for lead extraction with symptomatic or asymptomatic subclavian vein or superior vena cava thrombosis. Replacement of permanent pacemaker leads (PPLs) in these pts may be difficult and may require accessing a new site. We e
Autor:
Teruo Matsumoto, P. K. Bhatnagar, Audrey R. Wilson, Paul A. Khoury, Charles K. Field, Mark Rummel, Y. Ikeda, Morris D. Kerstein
Publikováno v:
The American Journal of Surgery. 171:251-254
Background The aim of this study was to evaluate the efficiency of thrombolysis in the presence of an occluded femoropopliteal synthetic graft. Patients and methods Over a 3-year period, 46 occluded femoropopliteal grafts were treated with urokinase