Showing 81 - 100 results of 4,519 for search '((cheen OR when) OR ((cheers OR hackers) OR (checker OR checked)))*', query time: 0.14s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84
  5. 85
  6. 86

    Determining optimal timing of birth for women with chronic or gestational hypertension at term: the WILL (When to Induce Labour to Limit risk in pregnancy hypertension) randomised trial by Magee, LA, Kirkham, K, Tohill, S, Gkini, E, Moakes, CA, Dorling, J, Green, M, Hutcheon, JA, Javed, M, Kigozi, J, Mol, BWM, Singer, J, Hardy, P, Stubbs, C, Thornton, JG, von Dadelszen, P, WILL Trial Study Group

    Published 2024
    “…A total of 403 participants (37.3% of target) were randomised to the intervention (n = 201) or control group (n = 202), from 3 June 2019 to 19 December 2022, when the funder stopped the trial for delayed recruitment. …”
    Journal article
  7. 87
  8. 88
  9. 89
  10. 90
  11. 91
  12. 92
  13. 93
  14. 94
  15. 95
  16. 96
  17. 97

    Synthesis and testing of asynchronous circuits - micropipeline by Khaing, Kathy.

    Published 2008
    “…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
    Get full text
    Thesis
  18. 98

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
    Get full text
    Thesis
  19. 99

    Live Verification in an Interactive Proof Assistant by Gruetter, Samuel, Fukala, Viktor, Chlipala, Adam

    Published 2024
    “…We prototyped our technique in the interactive proof assistant Coq, so our framework creates machine-checked proofs that the developed functions satisfy their specifications when executed according to the formal semantics of the source language. …”
    Get full text
    Article
  20. 100

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article