Littérature scientifique sur le sujet « ARM protocol »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « ARM protocol ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "ARM protocol"
Wijdenes, Paula, Michael Brouwers et Corry K. van der Sluis. « Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol ». Prosthetics and Orthotics International 42, no 1 (4 janvier 2018) : 56–59. http://dx.doi.org/10.1177/0309364617747962.
Texte intégralYang, Wei Ming. « Design of UART Downloading for Multi-Process Micro-Kernel Embedded OS on ARM ». Applied Mechanics and Materials 389 (août 2013) : 843–48. http://dx.doi.org/10.4028/www.scientific.net/amm.389.843.
Texte intégralZhang, Jin Hai. « Study on Embedded TCP_IP Protocol and ARM Implementation ». Applied Mechanics and Materials 556-562 (mai 2014) : 6046–49. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6046.
Texte intégralLi, Dan. « The Research of HART Sensor System Based on ARM ». Applied Mechanics and Materials 602-605 (août 2014) : 2855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2855.
Texte intégralOdutayo, Ayodele, Dmitry Gryaznov, Bethan Copsey, Paul Monk, Benjamin Speich, Corran Roberts, Karan Vadher et al. « Design, analysis and reporting of multi-arm trials and strategies to address multiple testing ». International Journal of Epidemiology 49, no 3 (16 mars 2020) : 968–78. http://dx.doi.org/10.1093/ije/dyaa026.
Texte intégralMorris, David M., et Ben R. Londeree. « The Effects of Bicycle Crank Arm Length on Oxygen Consumption ». Canadian Journal of Applied Physiology 22, no 5 (1 octobre 1997) : 429–38. http://dx.doi.org/10.1139/h97-027.
Texte intégralSeys, Stefaan, et Bart Preneel. « ARM : anonymous routing protocol for mobile ad hoc networks ». International Journal of Wireless and Mobile Computing 3, no 3 (2009) : 145. http://dx.doi.org/10.1504/ijwmc.2009.028896.
Texte intégralHou, Jing Jing, et Gen Wang Liu. « A Design of Li-Ion Battery Formation System Based on ARM Embedded Computer ». Advanced Materials Research 354-355 (octobre 2011) : 998–1001. http://dx.doi.org/10.4028/www.scientific.net/amr.354-355.998.
Texte intégralPedrosa, Gustavo F., Marina G. Simões, Marina O. C. Figueiredo, Lucas T. Lacerda, Brad J. Schoenfeld, Fernando V. Lima, Mauro H. Chagas et Rodrigo C. R. Diniz. « Training in the Initial Range of Motion Promotes Greater Muscle Adaptations Than at Final in the Arm Curl ». Sports 11, no 2 (6 février 2023) : 39. http://dx.doi.org/10.3390/sports11020039.
Texte intégralWalker, R., S. Powers et M. K. Stuart. « Peak oxygen uptake in arm ergometry : effects of testing protocol. » British Journal of Sports Medicine 20, no 1 (1 mars 1986) : 25–26. http://dx.doi.org/10.1136/bjsm.20.1.25.
Texte intégralThèses sur le sujet "ARM protocol"
Jonsson, Fredrik. « Arm-P : Almost Reliable Multicast protocol ». Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-14954.
Texte intégralDistribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource.
Many applications distribute the same information to multiple receivers, but in many cases the same information is sent to a single receiver at a time, thus multiple copies of the same information is sent, thus consuming bandwidth.
What if the information could be broadcasted to all the clients at the same time, similar to a television broadcast. TCP/IP provides some means to do that. For example UDP supports broadcasting; the problem faced when using UDP is that it’s not reliable. There is no guarantee that the information actually reaches the clients.
This Bachelor thesis in Computer Science aims to investigate the problems and solutions of how to achieve reliable distribution of fixed size data sets using a non reliable multicast communication channel, like UDP, in a LAN environment.
The thesis defines a protocol (Almost Reliable Multicast Protocol – Arm-P) that provides maximum scalability for delivery of versioned data sets that are designed to work in a LAN-environment. A proof-of-concept application is implemented for testing purposes.
Engstrand, Johan. « A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation ». Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.
Texte intégralŠpanihel, Pavol. « Zabezpečovací modul pro reklamní robot FEKT VUT v Brně ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219649.
Texte intégralZemánek, Petr. « Modulární RGB LED displej s rozhraním Ethernet ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220700.
Texte intégralKrůpa, Tomáš. « Univerzální zavaděč pro mikrokontrolér Kinetis K60 ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255480.
Texte intégralPérez, María del Carmen Marín. « Benchmarking and applications of a computational photobiology tool for design of novel and highly fluorescent rhodopsin proteins ». Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1070289.
Texte intégralNovotný, Jan. « Zpracování signálu UHF RFID čtečky ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221225.
Texte intégralSabt, Mohamed. « Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures ». Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Texte intégralThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Prítel, Pavol. « Implementace protokolu EtherCAT pro procesor ARM ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240937.
Texte intégralSanti, Juliana de 1982. « Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado ». [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.
Texte intégralDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008
Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High Speed TCP (HSTCP), uma variante do TCP para redes com PBA elevado, emprega ajustes mais agressivos permitindo, assim, que a utilização da banda seja escalável. As políticas de Gerenciamento Ativo de Filas ou Active Queue Management (AQM), monitoram o nível de ocupação das filas nos roteadores e notificam o congestionamento incipiente aos emissores TCP através do descarte/marcação de pacotes. O sistema de controle de congestionamento apresenta natureza de retroalimentação, na qual a taxa de transmissão dos nós fontes é ajustada em função do nível de ocupação da fila. Os controladores AQM determinam a probabilidade de descarte/marcação para maximizar a vazão e minimizar perdas, garantindo, assim, a estabilidade do tamanho da fila independentemente das variações das condições da rede. Neste trabalho, define-se a política de gerenciamento ativo de filas HSTCP-H2 para redes com PBA elevado que utilizam o protocolo HSTCP. Para a derivação de HSTCPH2: são utilizadas técnicas de Teoria de Controle Ótimo. A principal característica desta política é considerar o atraso do sistema o que permite melhor utilização dos recursos disponíveis. A estabilidade e os objetivos de desempenho do sistema são expressos e solucionados através de Desigualdades Matriciais Lineares, permitindo que os parâmetros do controlador possam ser calculados através da solução de um problema convexo simples. Diferentes controladores foram derivados considerando-se diferentes objetivos de desempenho, os quais consideram as características de redes com produto banda-atraso elevado. Através de simulações, os desempenhos dos controladores derivados são avaliados e a eficácia do controlador que apresentou o melhor desempenho foi comparado com o desempenho da política de AQM RED. São considerados cenários com enlace gargalo único e com múltiplos gargalos.
Abstract: The efficient utilization of bandwidth in high speed and large delay networks, called high bandwidth-delay product networks (BDP), has become a major challenge. This is due to adjustments of the Transmission Control Protocol (TCP). The High Speed TCP HSTCP): a TCP variant to high BDP networks, employs more aggressive adjustments, allowing scalable bandwidth utilization. The Active Queue Management (AQM) policies monitor the queue length in the routers and notify incipient congestion to TCP source by marking or dropping packets. The congestion control system presents intrinsic feedback nature, where the transmission rates of the sources are adjusted according to the level of congestion inferred by the queue occupancy. The AQM controllers determine the dropping marking probability values to maximize throughput and minimize losses, giving guarantees to stabilize the queue length independent of network conditions. In this work, it is defined HSTCP-H2, an active queue management policy to high BDP networks, which adopt the HSTCP as their transport protocol. Optimal control theory is used to conceive HSTCP-H2. The novelty of the proposed approach lies in consider the delay of the system which allows better use of available resources. Furthermore, in the proposed approach, stability and performance objectives are completely expressed as Linear Matrix Inequalities (LMIs), thus requiring the solution of a single convex problem for the computation of the controller parameters. Different controllers are derived considering different design goals, which take into account the characteristics of the high bandwidth-delay product networks. The performance produced by different optimal controllers was investigated. The efficacy of the controller with the best performance was then compared to the performance of RED policy. The simulation experiments were carried out using topologies with single and multiple bottleneck.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
Livres sur le sujet "ARM protocol"
Parker, Sue. 'Protocols are good for nurses'. Sutton : Reed Healthcare Communications, 1998.
Trouver le texte intégralDocumentary protocols : Protocoles documentaires (1967-1975) / sous la direction de Vincent Bonin avec la collaboration de Michèle Thériault. Montréal (Québec) Canada : Galerie Leonard & Bina Ellen Art Gallery, 2010.
Trouver le texte intégral1933-, Vazan Bill, et Musée national des beaux-arts du Québec, dir. Les matins infidèles : L'art du protocole. Québec, Québec : Musée national des beaux-arts du Québec, 2013.
Trouver le texte intégralPardon me, your manners are showing ! : Professional etiquette, protocol & diplomacy. Grand Forks, ND : Center for Innovation & Business Development, 1992.
Trouver le texte intégralRizzo, Galleria Michela, et Biennale di Venezia (55th : 2013 : Venice, Italy), dir. Protocolli veneziani I. Cinisello Balsamo, Milano : Silvana, 2013.
Trouver le texte intégralJones, Robin, Scott W. Miller, Nicole Cappuccio et Jennifer Courtwright. AIM national aquatic monitoring framework : Field protocol for wadeable lotic systems. Denver, Colo : U.S. Department of the Interior, Bureau of Land Management, National Operations Center, 2017.
Trouver le texte intégralR, Chari P., Rajain Arpit et Institute of Peace and Conflict Studies (New Delhi, India), dir. Working towards a verification protocol for biological weapons. New Delhi : Institute of Peace and Conflict Studies, 2001.
Trouver le texte intégralMiller, Derek. The security needs assessment protocol : Improving operational effectiveness through community security. New York : United Nations Institute for Disarmament Research, 2008.
Trouver le texte intégralChapitres de livres sur le sujet "ARM protocol"
González, Laura Pedraza, Leonardo Barneschi, Daniele Padula, Luca De Vico et Massimo Olivucci. « Evolution of the Automatic Rhodopsin Modeling (ARM) Protocol ». Dans Topics in Current Chemistry Collections, 105–52. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07658-9_5.
Texte intégralBina, T. S., M. E. Kunkel, E. G. R. dos Anjos, R. C. Ribeiro, T. V. Ribeiro et H. D. Silveira. « Creation of a 3D printing protocol for the unlimbited arm prosthesis ». Dans Advances and Current Trends in Biomechanics, 327–30. London : CRC Press, 2021. http://dx.doi.org/10.1201/9781003217152-72.
Texte intégralFerrario, Cinzia, Yousra Ben Khadra, Michela Sugni, M. Daniela Candia Carnevali, Pedro Martinez et Francesco Bonasoro. « Studying Echinodermata Arm Explant Regeneration Using Echinaster sepositus ». Dans Methods in Molecular Biology, 263–91. New York, NY : Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2172-1_14.
Texte intégralPeng, Daogang, Hao Zhang, Jiannian Weng, Hui Li et Fei Xia. « Development of EPA Protocol Information Enquiry Service System Based on Embedded ARM Linux ». Dans Web Information Systems and Mining, 363–72. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05250-7_39.
Texte intégralKoziel, Brian, Amir Jalali, Reza Azarderakhsh, David Jao et Mehran Mozaffari-Kermani. « NEON-SIDH : Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM ». Dans Cryptology and Network Security, 88–103. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48965-0_6.
Texte intégralBimonte-Nelson, Heather A. « The Water Radial-Arm Maze : Four Out of Eight Arms Platformed Protocol for Rodents ». Dans The Maze Book, 411–19. New York, NY : Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_15.
Texte intégralBimonte-Nelson, Heather A. « The Water Radial-Arm Maze : Seven Out of Eight Arms Platformed Protocol for Rodents ». Dans The Maze Book, 421–27. New York, NY : Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_16.
Texte intégralDaniel, Jill M. « The Land Radial-Arm Maze : Eight Out of Eight Arms Baited with Food Protocol for Rodents ». Dans The Maze Book, 429–32. New York, NY : Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_17.
Texte intégralChoi, Joonwon, Adam Chlipala et Arvind. « Hemiola : A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols ». Dans Computer Aided Verification, 317–39. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Texte intégralCrocker, Trisha, et Susan M. D. Carr. « Intervention Protocol ». Dans Clay Work and Body Image in Art Therapy, 137–50. New York : Routledge, 2021. : Routledge, 2021. http://dx.doi.org/10.4324/9781003097884-11.
Texte intégralActes de conférences sur le sujet "ARM protocol"
Wido, Daniel M., Denis J. DiAngelo et Brian P. Kelly. « Robotic Simulation of an Eccentric Lever Arm Protocol and a Novel Head Weight Protocol for Evaluation of the Subaxial Cervical Spine : An In Vitro Biomechancial Comparison ». Dans ASME 2011 Summer Bioengineering Conference. American Society of Mechanical Engineers, 2011. http://dx.doi.org/10.1115/sbc2011-53740.
Texte intégralMeling, Hein, et Alberto Montresor. « Type-safe dynamic protocol composition in Jgroup/ARM ». Dans the 3rd International DiscCoTec Workshop. New York, New York, USA : ACM Press, 2009. http://dx.doi.org/10.1145/1566966.1566967.
Texte intégralSeys, S., et B. Preneel. « ARM : Anonymous Routing Protocol for Mobile Ad hoc Networks ». Dans 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). IEEE, 2006. http://dx.doi.org/10.1109/aina.2006.104.
Texte intégralJadhav, A. D., et S. D. Mali. « RTOS based MODBUS protocol implementation on ARM-7 processor ». Dans the International Conference & Workshop. New York, New York, USA : ACM Press, 2011. http://dx.doi.org/10.1145/1980022.1980298.
Texte intégralKelong Wang, Daogang Peng, Lei Song et Hao Zhang. « Implementation of Modbus Communication Protocol based on ARM Coretx-M0 ». Dans 2014 International Conference on System Science and Engineering (ICSSE). IEEE, 2014. http://dx.doi.org/10.1109/icsse.2014.6887907.
Texte intégralLou Guohuan, Cai Haiting et Li Shujie. « Research and implementation of ARM-based fieldbus protocol conversion method ». Dans 2010 International Conference On Computer and Communication Technologies in Agriculture Engineering (CCTAE). IEEE, 2010. http://dx.doi.org/10.1109/cctae.2010.5544399.
Texte intégralMartinez, H. I. H., C. A. C. Morales et O. A. Martinez. « Automation of a robotic arm by analysing the CAN protocol ». Dans 14th International Conference on Electronics, Communications and Computers, 2004. CONIELECOMP 2004. IEEE, 2004. http://dx.doi.org/10.1109/icecc.2004.1269539.
Texte intégralAtmoko, Rachmad Andri, et Daoguo Yang. « Online Monitoring & ; Controlling Industrial Arm Robot Using MQTT Protocol ». Dans 2018 IEEE International Conference on Robotics, Biomimetics, and Intelligent Computational Systems (Robionetics ). IEEE, 2018. http://dx.doi.org/10.1109/robionetics.2018.8674672.
Texte intégralRupalwala, Shahin S. « ARM 11 based real-time video streaming server using RTSP protocol ». Dans 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO). IEEE, 2015. http://dx.doi.org/10.1109/eesco.2015.7253964.
Texte intégralZola, Enrica, Israel Martin-Escalona, Francisco Barcelo-Arroyo et Sergio Machado. « Implementation and analysis of the AODVv2 Routing Protocol in ARM devices ». Dans 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2021. http://dx.doi.org/10.1109/isncc52172.2021.9615672.
Texte intégralRapports d'organisations sur le sujet "ARM protocol"
Quak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), septembre 2021. http://dx.doi.org/10.19088/k4d.2021.133.
Texte intégralChen, Po-Wei, Hsiao-Yuan Su, Chih-Hsing Wu, Jih-I. Yeh, Ching-Hui Loh, Li-Yu Chen, Huei-Kai Huang et Shu-Man Lin. Association of Bisphosphonates with Risk of Incident Diabetes and Glycemic Control : A Protocol of Systematic Review and Meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, avril 2022. http://dx.doi.org/10.37766/inplasy2022.4.0125.
Texte intégralAndersen, K. The Authenticated Received Chain (ARC) Protocol. Sous la direction de B. Long, S. Blank et M. Kucherawy. RFC Editor, juillet 2019. http://dx.doi.org/10.17487/rfc8617.
Texte intégralPstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames et Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol : Part I—Ocean Shoreline Position, Version 2. National Park Service, juin 2022. http://dx.doi.org/10.36967/2293713.
Texte intégralZareian, Farzin, et Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, novembre 2020. http://dx.doi.org/10.55461/olpv6741.
Texte intégralSprague, Joshua, David Kushner, James Grunden, Jamie McClain, Benjamin Grime et Cullen Molitor. Channel Islands National Park Kelp Forest Monitoring Program : Annual report 2014. National Park Service, août 2022. http://dx.doi.org/10.36967/2293855.
Texte intégralArkko, J., et C. Pignataro. IANA Allocation Guidelines for the Address Resolution Protocol (ARP). RFC Editor, avril 2009. http://dx.doi.org/10.17487/rfc5494.
Texte intégralChu, Dahtzen, James Miller, David Underwood, Stuart Foltz, Scott Lux, Eileen Westervelt, Juan Davila-Perez et al. Standard protocol for protective storage of dormant Army facilities. Engineer Research and Development Center (U.S.), septembre 2018. http://dx.doi.org/10.21079/11681/29289.
Texte intégralMartins, Francisco, Cíntia França, Francisco Santos, Diogo Martinho, Carolina Saldanha et Élvio Rúbio Gouveia. Emerging technologies to promote fans interaction in football events : a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, février 2023. http://dx.doi.org/10.37766/inplasy2023.2.0015.
Texte intégralLeis, Sherry, Mike DeBacker, Lloyd Morrison, Gareth Rowell et Jennifer Haack. Vegetation community monitoring protocol for the Heartland Inventory and Monitoring Network : Narrative, Version 4.0. Sous la direction de Tani Hubbard. National Park Service, novembre 2022. http://dx.doi.org/10.36967/2294948.
Texte intégral