Showing 101 - 120 results of 1,237 for search '((((sheers OR chees) OR (hackers OR checked)) OR (cher OR chern)) OR bears)*', query time: 0.16s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104
  5. 105
  6. 106

    AI is a viable alternative to high throughput screening: a 318-target study by Wallach, Izhar, Bernard, Denzil, Nguyen, Kong, Ho, Gregory, Morrison, Adrian, Stecula, Adrian, Rosnik, Andreana, O’Sullivan, Ann Marie, Davtyan, Aram, Samudio, Ben, Thomas, Bill, Worley, Brad, Butler, Brittany, Laggner, Christian, Thayer, Desiree, Moharreri, Ehsan, Friedland, Greg, Truong, Ha, van den Bedem, Henry, Ng, Ho Leung, Stafford, Kate, Sarangapani, Krishna, Giesler, Kyle, Ngo, Lien, Mysinger, Michael, Ahmed, Mostafa, Anthis, Nicholas J., Henriksen, Niel, Gniewek, Pawel, Eckert, Sam, de Oliveira, Saulo, Suterwala, Shabbir, PrasadPrasad, Srimukh Veccham Krishna, Shek, Stefani, Contreras, Stephanie, Hare, Stephanie, Palazzo, Teresa, O’Brien, Terrence E., Van Grack, Tessa, Williams, Tiffany, Chern, Ting-Rong, Kenyon, Victor, Lee, Andreia H., Cann, Andrew B., Bergman, Bastiaan, Anderson, Brandon M., Cox, Bryan D., Warrington, Jeffrey M., Sorenson, Jon M., Goldenberg, Joshua M., Young, Matthew A., DeHaan, Nicholas, Pemberton, Ryan P., Schroedl, Stefan, Abramyan, Tigran M., Gupta, Tushita, Mysore, Venkatesh, Presser, Adam G., Ferrando, Adolfo A., Andricopulo, Adriano D., Ghosh, Agnidipta, Ayachi, Aicha Gharbi, Mushtaq, Aisha, Shaqra, Ala M., Toh, Alan Kie Leong, Smrcka, Alan V., Ciccia, Alberto, de Oliveira, Aldo Sena, Sverzhinsky, Aleksandr, de Sousa, Alessandra Mara, Agoulnik, Alexander I., Kushnir, Alexander, Freiberg, Alexander N., Statsyuk, Alexander V., Gingras, Alexandre R., Degterev, Alexei, Tomilov, Alexey, Vrielink, Alice, Garaeva, Alisa A., Bryant-Friedrich, Amanda, Caflisch, Amedeo, Patel, Amit K., Rangarajan, Amith Vikram, Matheeussen, An, Battistoni, Andrea, Caporali, Andrea, Chini, Andrea, Ilari, Andrea, Mattevi, Andrea, Foote, Andrea Talbot, Trabocchi, Andrea, Stahl, Andreas, Herr, Andrew B., Berti, Andrew, Freywald, Andrew, Reidenbach, Andrew G., Lam, Andrew, Cuddihy, Andrew R., White, Andrew, Taglialatela, Angelo

    Published 2024
    Get full text
    Journal Article
  7. 107

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  8. 108

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
    Get full text
    Thesis
  9. 109

    B-twisted Gaiotto–Witten theory and topological quantum field theory by Garner, N, Geer, N, Young, MB

    Published 2025
    “…The physical theories we model admit alternative realizations as Chern&ndash;Simons&ndash;Rozansky&ndash;Witten theories and supergroup Chern&ndash;Simons theories and include as particular examples global forms of <em>gl</em>(1|1)&ndash;Chern&ndash;Simons theory and toral Chern&ndash;Simons theory. …”
    Journal article
  10. 110

    Theory of Quantum Anomalous Hall Phases in Pentalayer Rhombohedral Graphene Moiré Structures by Dong, Zhihuan, Patri, Adarsh S., Senthil, Todadri

    Published 2024
    “…Here we show that electron-electron interactions play a crucial role, and present microscopic theoretical calculations demonstrating the emergence of a nearly flat, isolated, Chern-1 band and FQAH phases in this system. We also study the four- and six-layer analogs and identify parameters where a nearly flat isolated Chern-1 band emerges which may be suitable to host FQAH physics.…”
    Get full text
    Article
  11. 111

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  12. 112

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  13. 113

    Development of a human-robot cooperative control system by Sayyed Omar Kamal Bin Syed Zin Al-Jufry

    Published 2014
    “…During the final year of study in the course for the Bachelor’s in Electrical & Electronics Engineering in Nanyang Technological University, the student was assigned to the Final Year Project for Safe Human-Robot Interaction under the supervision of Associate Professor Cheah Chien Chern. The project’s objective was achieved through the use of a Microsoft Kinect depth sensor to monitor the position of a SCARA robot and determine safety actions to be taken by the robot. …”
    Get full text
    Final Year Project (FYP)
  14. 114
  15. 115

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  16. 116

    IS activity in Southeast Asia by Liow, Joseph Chinyong, Liow Chin Yong, Joseph

    Published 2015
    “…The increasing number of recruits from Indonesia and Malaysia to Islamic State reflects the evolving security threat to Southeast Asia. The emerging pattern bears lessons for countries in the region.…”
    Get full text
    Get full text
    Commentary
  17. 117
  18. 118

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  19. 119
  20. 120