Showing 61 - 80 results of 1,225 for search '(((ceres OR cerys) OR bears) OR ((hackers OR checks) OR ((chees OR (chers OR chees)) OR chern)))', query time: 0.19s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69

    AI is a viable alternative to high throughput screening: a 318-target study by Wallach, Izhar, Bernard, Denzil, Nguyen, Kong, Ho, Gregory, Morrison, Adrian, Stecula, Adrian, Rosnik, Andreana, O’Sullivan, Ann Marie, Davtyan, Aram, Samudio, Ben, Thomas, Bill, Worley, Brad, Butler, Brittany, Laggner, Christian, Thayer, Desiree, Moharreri, Ehsan, Friedland, Greg, Truong, Ha, van den Bedem, Henry, Ng, Ho Leung, Stafford, Kate, Sarangapani, Krishna, Giesler, Kyle, Ngo, Lien, Mysinger, Michael, Ahmed, Mostafa, Anthis, Nicholas J., Henriksen, Niel, Gniewek, Pawel, Eckert, Sam, de Oliveira, Saulo, Suterwala, Shabbir, PrasadPrasad, Srimukh Veccham Krishna, Shek, Stefani, Contreras, Stephanie, Hare, Stephanie, Palazzo, Teresa, O’Brien, Terrence E., Van Grack, Tessa, Williams, Tiffany, Chern, Ting-Rong, Kenyon, Victor, Lee, Andreia H., Cann, Andrew B., Bergman, Bastiaan, Anderson, Brandon M., Cox, Bryan D., Warrington, Jeffrey M., Sorenson, Jon M., Goldenberg, Joshua M., Young, Matthew A., DeHaan, Nicholas, Pemberton, Ryan P., Schroedl, Stefan, Abramyan, Tigran M., Gupta, Tushita, Mysore, Venkatesh, Presser, Adam G., Ferrando, Adolfo A., Andricopulo, Adriano D., Ghosh, Agnidipta, Ayachi, Aicha Gharbi, Mushtaq, Aisha, Shaqra, Ala M., Toh, Alan Kie Leong, Smrcka, Alan V., Ciccia, Alberto, de Oliveira, Aldo Sena, Sverzhinsky, Aleksandr, de Sousa, Alessandra Mara, Agoulnik, Alexander I., Kushnir, Alexander, Freiberg, Alexander N., Statsyuk, Alexander V., Gingras, Alexandre R., Degterev, Alexei, Tomilov, Alexey, Vrielink, Alice, Garaeva, Alisa A., Bryant-Friedrich, Amanda, Caflisch, Amedeo, Patel, Amit K., Rangarajan, Amith Vikram, Matheeussen, An, Battistoni, Andrea, Caporali, Andrea, Chini, Andrea, Ilari, Andrea, Mattevi, Andrea, Foote, Andrea Talbot, Trabocchi, Andrea, Stahl, Andreas, Herr, Andrew B., Berti, Andrew, Freywald, Andrew, Reidenbach, Andrew G., Lam, Andrew, Cuddihy, Andrew R., White, Andrew, Taglialatela, Angelo

    Published 2024
    Get full text
    Journal Article
  10. 70

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  11. 71

    B-twisted Gaiotto–Witten theory and topological quantum field theory by Garner, N, Geer, N, Young, MB

    Published 2025
    “…The physical theories we model admit alternative realizations as Chern&ndash;Simons&ndash;Rozansky&ndash;Witten theories and supergroup Chern&ndash;Simons theories and include as particular examples global forms of <em>gl</em>(1|1)&ndash;Chern&ndash;Simons theory and toral Chern&ndash;Simons theory. …”
    Journal article
  12. 72

    Theory of Quantum Anomalous Hall Phases in Pentalayer Rhombohedral Graphene Moiré Structures by Dong, Zhihuan, Patri, Adarsh S., Senthil, Todadri

    Published 2024
    “…Here we show that electron-electron interactions play a crucial role, and present microscopic theoretical calculations demonstrating the emergence of a nearly flat, isolated, Chern-1 band and FQAH phases in this system. We also study the four- and six-layer analogs and identify parameters where a nearly flat isolated Chern-1 band emerges which may be suitable to host FQAH physics.…”
    Get full text
    Article
  13. 73

    Sowing the seeds of love: Ovid's Sementivae (Fasti 1.655-704) by Armstrong, RM

    Published 2024
    “…Meanwhile, he also modifies and subtly reconfigures the relationship between Ceres and Tellus in a manner not found in either of his dominant poetic influences. …”
    Book section
  14. 74

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  15. 75

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  16. 76

    Development of a human-robot cooperative control system by Sayyed Omar Kamal Bin Syed Zin Al-Jufry

    Published 2014
    “…During the final year of study in the course for the Bachelor’s in Electrical & Electronics Engineering in Nanyang Technological University, the student was assigned to the Final Year Project for Safe Human-Robot Interaction under the supervision of Associate Professor Cheah Chien Chern. The project’s objective was achieved through the use of a Microsoft Kinect depth sensor to monitor the position of a SCARA robot and determine safety actions to be taken by the robot. …”
    Get full text
    Final Year Project (FYP)
  17. 77

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  18. 78
  19. 79

    A Multi-satellite Perspective on “Hot Tower” Characteristics in the Equatorial Trough Zone by Pilewskie, J, Stephens, G, Takahashi, H, L’Ecuyer, T

    Published 2024
    “…Cloud vertical profiles from CloudSat and CALIPSO measurements supply convective core diameters and proxies for intensity and convective activity, and these proxies are augmented with brightness temperature data from geostationary satellite observations, precipitation information from IMERG, and cloud radiative properties from CERES. Less than 35% of all deep cores are classified as hot towers, and we estimate that 800–1700 hot towers occur at any given time over the course of a day, with the mean maximum core and hot tower frequency occurring at the time of year when peak convective intensity and precipitation occur. …”
    Journal article
  20. 80

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)