Search
Skip to Search Results- 5351Hill Times Publishing
- 5159Toronto Stock Exchange
- 483Marian Gould Gallagher Law Library
- 423Dolphin, Ric
- 421Dolphin Media Inc.
- 227TSX Venture Exchange
- 4568Stock exchanges--Canada--Tables--Periodicals
- 4437Toronto Stock Exchange--Periodicals
- 3147Canada--Parliament--Periodicals
- 1543Canada-- Parliament-- Periodicals
- 768Diplomatic and consular service--Canada--Newspapers
- 767Diplomats--Ontario--Ottawa--Newspapers
- 12184University of Alberta Libraries Licensed Resources
- 4930University of Alberta Libraries Licensed Resources/Daily Record (Toronto Stock Exchange)
- 2758University of Alberta Libraries Licensed Resources/Parliament Now
- 1496University of Alberta Libraries Licensed Resources/The Hill Times
- 652Oil Sands Research and Information Network (OSRIN)
- 593University of Alberta Libraries Licensed Resources/Embassy (Ottawa, Ont.)
-
Tree Growth on Reclaimed Overburden Sites Containing Petroleum Hydrocarbons at the Suncor Base Mine
Download2018-08-01
Paragon Soil and Environmental Consulting Inc.
Paragon Soil and Environmental Consulting Inc. (Paragon) was contracted to complete a field program and analysis for the Canada’s Oil Sands Innovation Alliance (COSIA) Joint Industry Project (JIP) partners Syncrude Canada Limited (Syncrude), Imperial Oil Resources Limited (Imperial), Canadian...
-
-
2005
Fyles, James, Kopra, Kristin, Sustainable Forest Management Network
SFM Network Research Note Series No. 14
-
2013-10-18
Gould, K., Wood, S., Smreciu, A.
Species profile for Trientalis borealis: northern starflower
-
2005-01-01
Chan, LIza, Scott, Ann, Collins, Seanna, Guo, Bing, Topher, Leigh-Ann
The objective of this report is to assess the efficacy and safety of using trigger point injection (TPI) to treat patients with chronic non-malignant musculoskeletal pain, based on a systematic review of the current published evidence, and to determine the current state of the procedure, the...
-
2016-05-02
The Rivest Shamir Adelman (RSA) is a popular cryptosystem. Mainly used for its easy implementation in securing data transmissions. In RSA cryptography, two different keys are used; a private and public key. The public keys can be shared with everyone where the private key is a secret. RSA has...