Showing 61 - 80 results of 1,227 for search '(((cers OR cerys) OR bears) OR ((hackers OR checks) OR ((chees OR (chers OR chees)) OR chern)))', query time: 0.20s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69

    AI is a viable alternative to high throughput screening: a 318-target study by Wallach, Izhar, Bernard, Denzil, Nguyen, Kong, Ho, Gregory, Morrison, Adrian, Stecula, Adrian, Rosnik, Andreana, O’Sullivan, Ann Marie, Davtyan, Aram, Samudio, Ben, Thomas, Bill, Worley, Brad, Butler, Brittany, Laggner, Christian, Thayer, Desiree, Moharreri, Ehsan, Friedland, Greg, Truong, Ha, van den Bedem, Henry, Ng, Ho Leung, Stafford, Kate, Sarangapani, Krishna, Giesler, Kyle, Ngo, Lien, Mysinger, Michael, Ahmed, Mostafa, Anthis, Nicholas J., Henriksen, Niel, Gniewek, Pawel, Eckert, Sam, de Oliveira, Saulo, Suterwala, Shabbir, PrasadPrasad, Srimukh Veccham Krishna, Shek, Stefani, Contreras, Stephanie, Hare, Stephanie, Palazzo, Teresa, O’Brien, Terrence E., Van Grack, Tessa, Williams, Tiffany, Chern, Ting-Rong, Kenyon, Victor, Lee, Andreia H., Cann, Andrew B., Bergman, Bastiaan, Anderson, Brandon M., Cox, Bryan D., Warrington, Jeffrey M., Sorenson, Jon M., Goldenberg, Joshua M., Young, Matthew A., DeHaan, Nicholas, Pemberton, Ryan P., Schroedl, Stefan, Abramyan, Tigran M., Gupta, Tushita, Mysore, Venkatesh, Presser, Adam G., Ferrando, Adolfo A., Andricopulo, Adriano D., Ghosh, Agnidipta, Ayachi, Aicha Gharbi, Mushtaq, Aisha, Shaqra, Ala M., Toh, Alan Kie Leong, Smrcka, Alan V., Ciccia, Alberto, de Oliveira, Aldo Sena, Sverzhinsky, Aleksandr, de Sousa, Alessandra Mara, Agoulnik, Alexander I., Kushnir, Alexander, Freiberg, Alexander N., Statsyuk, Alexander V., Gingras, Alexandre R., Degterev, Alexei, Tomilov, Alexey, Vrielink, Alice, Garaeva, Alisa A., Bryant-Friedrich, Amanda, Caflisch, Amedeo, Patel, Amit K., Rangarajan, Amith Vikram, Matheeussen, An, Battistoni, Andrea, Caporali, Andrea, Chini, Andrea, Ilari, Andrea, Mattevi, Andrea, Foote, Andrea Talbot, Trabocchi, Andrea, Stahl, Andreas, Herr, Andrew B., Berti, Andrew, Freywald, Andrew, Reidenbach, Andrew G., Lam, Andrew, Cuddihy, Andrew R., White, Andrew, Taglialatela, Angelo

    Published 2024
    Get full text
    Journal Article
  10. 70

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  11. 71

    Cost of the national malaria control program and cost-effectiveness of indoor residual spraying and insecticide-treated bed net interventions in two districts of Madagascar by Andrianantoandro, VTA, Audibert, M, Kesteman, T, Ravolanjarasoa, L, Randrianarivelojosia, M, Rogier, C

    Published 2024
    “…The cost-effectiveness ratio (CER) of ITN intervention was then compared to the CER of IRS intervention to identify the most cost-effective intervention. …”
    Journal article
  12. 72

    B-twisted Gaiotto–Witten theory and topological quantum field theory by Garner, N, Geer, N, Young, MB

    Published 2025
    “…The physical theories we model admit alternative realizations as Chern&ndash;Simons&ndash;Rozansky&ndash;Witten theories and supergroup Chern&ndash;Simons theories and include as particular examples global forms of <em>gl</em>(1|1)&ndash;Chern&ndash;Simons theory and toral Chern&ndash;Simons theory. …”
    Journal article
  13. 73

    Theory of Quantum Anomalous Hall Phases in Pentalayer Rhombohedral Graphene Moiré Structures by Dong, Zhihuan, Patri, Adarsh S., Senthil, Todadri

    Published 2024
    “…Here we show that electron-electron interactions play a crucial role, and present microscopic theoretical calculations demonstrating the emergence of a nearly flat, isolated, Chern-1 band and FQAH phases in this system. We also study the four- and six-layer analogs and identify parameters where a nearly flat isolated Chern-1 band emerges which may be suitable to host FQAH physics.…”
    Get full text
    Article
  14. 74

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  15. 75

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  16. 76

    Development of a human-robot cooperative control system by Sayyed Omar Kamal Bin Syed Zin Al-Jufry

    Published 2014
    “…During the final year of study in the course for the Bachelor’s in Electrical & Electronics Engineering in Nanyang Technological University, the student was assigned to the Final Year Project for Safe Human-Robot Interaction under the supervision of Associate Professor Cheah Chien Chern. The project’s objective was achieved through the use of a Microsoft Kinect depth sensor to monitor the position of a SCARA robot and determine safety actions to be taken by the robot. …”
    Get full text
    Final Year Project (FYP)
  17. 77

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  18. 78
  19. 79

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    IS activity in Southeast Asia by Liow, Joseph Chinyong, Liow Chin Yong, Joseph

    Published 2015
    “…The increasing number of recruits from Indonesia and Malaysia to Islamic State reflects the evolving security threat to Southeast Asia. The emerging pattern bears lessons for countries in the region.…”
    Get full text
    Get full text
    Commentary