Search Results

There are 7649 results for: content related to: Individual Differences in Strategy Use in Second Language Reading and Testing

  1. Media Security

    SIP Security

    Dorgham Sisalem, John Floroiu, Jiri Kuthan, Ulrich Abend, Henning Schulzrinne, Pages: 173–223, 2009

    Published Online : 11 MAY 2009, DOI: 10.1002/9780470516997.ch7

  2. Fusion: coalesced confidential storage and communication framework for the IoT

    Security and Communication Networks

    Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig and Thiemo Voigt

    Article first published online : 30 APR 2015, DOI: 10.1002/sec.1260

  3. You have free access to this content

    ETS Research Report Series

    Volume 1983, Issue 2, December 1983, Pages: i–14, David Weiss and Rex Jackson

    Article first published online : 26 SEP 2014, DOI: 10.1002/j.2330-8516.1983.tb00027.x

  4. You have free access to this content
    Earnings Management Using the Valuation Allowance for Deferred Tax Assets under SFAS No. 109

    Contemporary Accounting Research

    Volume 20, Issue 3, Fall 2003, Pages: 579–611, Catherine M. Schrand and M. H. Franco Wong

    Article first published online : 15 JAN 2010, DOI: 10.1506/480D-098U-607R-5D9W

  5. Control and Provisioning of Wireless Access Points (CAPWAP)

    Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

    Christian Jacquenet, Gilles Bourdon, Mohamed Boucadair, Pages: 175–186, 2008

    Published Online : 31 MAR 2008, DOI: 10.1002/9780470035146.ch7

  6. Structure and Function of the Thin Limbs of the Loop of Henle

    Standard Article

    Comprehensive Physiology

    Thomas L. Pannabecker

    Published Online : 1 JUL 2012, DOI: 10.1002/cphy.c110019

  7. A new approach to authenticating and encrypting Voice over Internet Protocol communications

    Software: Practice and Experience

    Volume 44, Issue 5, May 2014, Pages: 593–619, J. Lago-Fernández, F. Gil-Castiñeira, F.J. González-Castaño and A.  Román-Portabales

    Article first published online : 12 DEC 2012, DOI: 10.1002/spe.2175

  8. Urine concentrating mechanism in the inner medulla of the mammalian kidney: role of three-dimensional architecture

    Acta Physiologica

    Volume 202, Issue 3, July 2011, Pages: 361–378, W. H. Dantzler, T. L. Pannabecker, A. T. Layton and H. E. Layton

    Article first published online : 7 DEC 2010, DOI: 10.1111/j.1748-1716.2010.02214.x

  9. Morphology of the Loop of Henle, Distal Tubule, and Collecting Duct

    Standard Article

    Comprehensive Physiology

    B. Kaissling and W. Kriz

    Published Online : 1 JAN 2011, DOI: 10.1002/cphy.cp080103

  10. Introduction to Cryptographic Mechanisms

    SIP Security

    Dorgham Sisalem, John Floroiu, Jiri Kuthan, Ulrich Abend, Henning Schulzrinne, Pages: 5–41, 2009

    Published Online : 11 MAY 2009, DOI: 10.1002/9780470516997.ch2

  11. The Effect of Computer-Assisted Instruction on ESL Reading Achievement

    The Modern Language Journal

    Volume 71, Issue 3, Autumn 1987, Pages: 267–276, HOWARD H. KLEINMANN

    Article first published online : 20 OCT 2011, DOI: 10.1111/j.1540-4781.1987.tb00366.x

  12. A secured, automated, and dynamic end-to-end service level negotiation

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 2, February 2013, Pages: 180–202, M. A. Chalouf and F. Krief

    Article first published online : 18 JAN 2012, DOI: 10.1002/cpe.2806

  13. Other Applications of SSL

    Implementing SSL/TLS Using Cryptography and PKI

    Joshua Davies, Pages: 543–566, 2011

    Published Online : 3 NOV 2011, DOI: 10.1002/9781118255797.ch10

  14. SSL, TLS and DTLS Protocols

    Network Security

    André Perez, Pages: 109–132, 2014

    Published Online : 24 SEP 2014, DOI: 10.1002/9781119043942.ch5

  15. WebRTC

    Multimedia Networks: Protocols, Design, and Applications

    Hans W. Barz, Gregory A. Bassett, Pages: 213–222, 2016

    Published Online : 15 JAN 2016, DOI: 10.1002/9781119090151.ch8

  16. GPS C/A Code Signal Structure

    Fundamentals of Global Positioning System Receivers: A Software Approach

    James Bao-Yen Tsui, Pages: 73–108, 2001

    Published Online : 29 OCT 2001, DOI: 10.1002/0471200549.ch5

  17. You have free access to this content

    ETS Research Report Series

    Volume 1986, Issue 2, December 1986, Pages: i–21, William C. Ward, Roberta G. Kline and Jan Flaugher

    Article first published online : 26 SEP 2014, DOI: 10.1002/j.2330-8516.1986.tb00184.x

  18. Fifty-Seven Serious Defects in ‘Australian’ IFRS

    Australian Accounting Review

    Volume 18, Issue 1, March 2008, Pages: 46–62, Stephen Haswell and Ian Langfield-Smith

    Article first published online : 21 JUL 2008, DOI: 10.1111/j.1835-2561.2008.0006.x

  19. Service Aspects

    NGN Architectures, Protocols and Services

    Toni Janevski, Pages: 221–259, 2014

    Published Online : 7 MAR 2014, DOI: 10.1002/9781118607381.ch7

  20. Energy Management

    Digital Circuit Boards: Mach 1GHz

    Ralph Morrison, Pages: 82–105, 2012

    Published Online : 11 MAY 2012, DOI: 10.1002/9781118278123.ch4