Showing 81 - 100 results of 1,101 for search '(((hackers OR checker) OR ceres) OR center)', query time: 0.12s Refine Results
  1. 81
  2. 82
  3. 83

    Fully converged integral cross sections of collision induced dissociation, four-center, and single exchange reactions, and accuracy of the centrifugal sudden approximation in H2 + D2 reaction by Song, Hongwei, Lu, Yunpeng, Lee, Soo-Ying

    Published 2013
    “…With a full-dimensional model, the first fully converged coupled-channel (CC) cross sections for different competitive processes from the ground rotational state were obtained: collision induced dissociation (CID), four-center (4C) reaction and single exchange (SE) reaction. …”
    Get full text
    Get full text
    Journal Article
  4. 84

    Gobo: A System for Exploring User Control of Invisible Algorithms in Social Media by Bhargava, Rahul, Chung, Anna, Gaikwad, Neil S, Hope, Alexis, Jen, Dennis, Rubinovitz, Jasmin, Saldías-Fuentes, Belén, Zuckerman, Ethan

    Published 2020
    Subjects: “…Computing methodologies, Artificial intelligence, Human-centered computing, Field studies, Information systems , Open source software, Human-centered computing, Social media, Algorithmic Transparency, Algorithmic Accountability…”
    Get full text
    Article
  5. 85

    Centering Patient and Clinician Voices in Developing Tools to Address Pain Related School Impairment: A Phase I Study of a Virtual Reality School Simulation for Children and Adolescents with Chronic Pain by Logan, Deirdre E., Khanna, Karina, Randall, Edin, O’Donnell, Shealyn, Reks, Talis, McLennan, Logan

    Published 2023
    “…Following guidelines for developing user-centered VR interventions, initial phases of intervention development focus on understanding and incorporating patient and clinician perspectives when designing this digital health tool. …”
    Get full text
    Article
  6. 86
  7. 87
  8. 88
  9. 89
  10. 90
  11. 91

    Synthesis and testing of asynchronous circuits - micropipeline by Khaing, Kathy.

    Published 2008
    “…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
    Get full text
    Thesis
  12. 92

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  13. 93

    Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes by Tay, Eng Boon.

    Published 2008
    “…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
    Get full text
    Thesis
  14. 94

    Sowing the seeds of love: Ovid's Sementivae (Fasti 1.655-704) by Armstrong, RM

    Published 2024
    “…Meanwhile, he also modifies and subtly reconfigures the relationship between Ceres and Tellus in a manner not found in either of his dominant poetic influences. …”
    Book section
  15. 95

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  16. 96

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  17. 97
  18. 98

    Memory Checking Requires Logarithmic Overhead by Boyle, Elette, Komargodski, Ilan, Vafa, Neekon

    Published 2025
    “…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
    Get full text
    Article
  19. 99

    A Multi-satellite Perspective on “Hot Tower” Characteristics in the Equatorial Trough Zone by Pilewskie, J, Stephens, G, Takahashi, H, L’Ecuyer, T

    Published 2024
    “…Cloud vertical profiles from CloudSat and CALIPSO measurements supply convective core diameters and proxies for intensity and convective activity, and these proxies are augmented with brightness temperature data from geostationary satellite observations, precipitation information from IMERG, and cloud radiative properties from CERES. Less than 35% of all deep cores are classified as hot towers, and we estimate that 800–1700 hot towers occur at any given time over the course of a day, with the mean maximum core and hot tower frequency occurring at the time of year when peak convective intensity and precipitation occur. …”
    Journal article
  20. 100

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)