Search alternatives:
horn » hoon (Expand Search), hon (Expand Search)
Showing 2,101 - 2,105 results of 2,105 for search '(((horn OR (town OR own)) OR (born OR boon)) OR turn)', query time: 0.14s Refine Results
  1. 2101

    Advanced attack and defense techniques in machine learning systems by Zhao, Mengchen

    Published 2019
    “…Towards building secure machine learning systems, the first step is to study their vulnerability, which turns out to be very challenging due to the variety and complexity of machine learning systems. …”
    Get full text
    Get full text
    Thesis
  2. 2102

    Discrete differential geometry driven methods for architectural geometry by Yao, Sidan

    Published 2022
    “…For each face with small curvature difference, we compute a stretch matrix that turns the principal directions into a pair of conjugate directions. …”
    Get full text
    Thesis-Doctor of Philosophy
  3. 2103

    Innovation and firm survival: the role of timing, funding, and networks by Gao, Ming

    Published 2024
    “…Therefore, researchers realized that attention should be turned to exploring heterogeneous issues or the factors that may affect the influence of innovation on firms’ survival. …”
    Get full text
    Thesis-Doctor of Philosophy
  4. 2104

    Transport phenomena of immiscible fluids in microchannels by Yin, Shuai

    Published 2021
    “…In addition, a universal and simple method is developed to actively generate oil in water (O/W) droplet in a Poly(dimethylsiloxane) (PDMS) based microfluidic device by using both DC and AC electric fields to cut a stable layered flow of disperse phase into dispersed droplets in a precise manner. The system owns the feature of ultra-fast response and precise control of O/W droplet generation. …”
    Get full text
    Thesis-Doctor of Philosophy
  5. 2105

    Physical unclonable function based solutions to unification of user, device and data authentication by Zheng, Yue

    Published 2020
    “…These solutions are typically realized using conventional techniques that require the safekeeping of a secret binary key in the non-volatile memory, or battery-backed SRAM of some device, or a token owned by the user, which have been proven to be vulnerable to various kinds of invasive, semi-invasive and side channel attacks. …”
    Get full text
    Thesis-Doctor of Philosophy