Search alternatives:
fill » film (Expand Search), file (Expand Search)
fall » call (Expand Search), wall (Expand Search)
binding » finding (Expand Search)
fill » film (Expand Search), file (Expand Search)
fall » call (Expand Search), wall (Expand Search)
binding » finding (Expand Search)
-
1341
Convex optimization for nonequilibrium steady states on a hybrid quantum processor
Published 2023Get full text
Journal Article -
1342
-
1343
Uncovering vein patterns from color skin images for personal identification in forensic investigation
Published 2013“…Based on this approach we develop four optical models for simulating skin color formation. They are all based on the radiative transfer equation which quantitatively describes transport of light in the human skin. …”
Get full text
Thesis -
1344
Efficient techniques for subgraph mining and query processing
Published 2015“…We partition the collection of graphs among worker nodes, and each worker applies the filter step to determine a set of candidate subgraphs that are {\em locally frequent} in its partition. The union of all such graphs is the input to the refinement step, where each candidate is checked against all partitions and only the {\em globally frequent} graphs are retained. …”
Get full text
Thesis -
1345
Carrier scattering mechanisms limiting mobility in hydrogen-doped indium oxide
Published 2019Get full text
Get full text
Journal Article -
1346
Genotype-phenotype maps for gene networks: from evolution to computation
Published 2017“…For both modelling frameworks, the GRN GP maps exhibit all the structural properties found in the literature, as well as simplicity bias. …”
Thesis -
1347
-
1348
Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program /
Published 2023“…Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book Description Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. …”
Get full text
Get full text
software, multimedia -
1349
Who2chat: A Social Networking System for Academic Researchers in Virtual Social Hours Enabling Coordinating, Overcoming Barriers and Social Signaling
Published 2024“…Who2chat allows academic researchers to create a research profile and express their research interests, find researchers with similar interests, overcome social barriers, and coordinate and start video chats, all within a single interface. …”
Get full text
Article -
1350
-
1351
Highly sensitive transistor sensor for biochemical sensing and health monitoring applications: a review
Published 2023Get full text
Journal Article -
1352
Phononic real Chern insulator with protected corner modes in graphynes
Published 2023Get full text
Journal Article -
1353
Slip rate deficit and earthquake potential on shallow megathrusts
Published 2022Get full text
Journal Article -
1354
Dynamic spectrum allocation for heterogeneous cognitive radio networks with multiple channels
Published 2019Get full text
Get full text
Journal Article -
1355
-
1356
Ultra-high Q even eigenmode resonance in terahertz metamaterials
Published 2015“…The high Q even eigenmode could find applications in designing label free bio-sensors and for studying the enhanced light matter interaction effects.…”
Get full text
Get full text
Journal Article -
1357
RoboTSP - a fast solution to the robotic task sequencing problem
Published 2021Get full text
Conference Paper -
1358
An additive manufacturing process model for product family design
Published 2017“…By utilising AM, we eliminate all constraints which arise in conventional product family designs from finding a compromise between commonality and performance. …”
Get full text
Get full text
Journal Article -
1359
Glycans function as a Golgi export signal to promote the constitutive exocytic trafficking
Published 2020Get full text
Journal Article -
1360
Causal attribution, benefits sharing, and earnings management
Published 2022Get full text
Journal Article