Search alternatives:
pinnae » pinna (Expand Search), pinnau (Expand Search), pinnacle (Expand Search)
fine » find (Expand Search), five (Expand Search)
spina » spinal (Expand Search), espina (Expand Search), spinae (Expand Search)
ping » ling (Expand Search), ming (Expand Search), peng (Expand Search)
bina » bin (Expand Search), bing (Expand Search)
line » like (Expand Search), life (Expand Search)
pinnae » pinna (Expand Search), pinnau (Expand Search), pinnacle (Expand Search)
fine » find (Expand Search), five (Expand Search)
spina » spinal (Expand Search), espina (Expand Search), spinae (Expand Search)
ping » ling (Expand Search), ming (Expand Search), peng (Expand Search)
bina » bin (Expand Search), bing (Expand Search)
line » like (Expand Search), life (Expand Search)
-
341
-
342
Characterization of the RIN-to-phase-noise conversion in the mode-locked fiber lasers
Published 2013Get full text
Get full text
Get full text
Conference Paper -
343
Balance theory and the perception of religious relationships : an application of three quantitative cognitive consistency models in Singapore.
Published 2008Get full text
Final Year Project (FYP) -
344
林锦微型小说中的主题分析 = Literary themes in Lin Jin's mini-fiction
Published 2021Get full text
Final Year Project (FYP) -
345
新加坡当代社会同志自由的研究 = A study of homosexuals’ liberty in present day Singapore
Published 2016Get full text
Final Year Project (FYP) -
346
-
347
-
348
-
349
-
350
-
351
-
352
-
353
Public participation efficiency in planning for urban development in Bida, Nigeria /
Published 2017software, multimedia -
354
-
355
Adjoint-state differential arrival time tomography
Published 2024“…Numerical examples demonstrate that the ATT-CS method is a valuable tool for imaging receiver-side fine-scale velocity structures. Conversely, the ATT-CR method is well suited for resolving source-side velocity structures. …”
Get full text
Journal Article -
356
Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
Published 2022“…The system model under consideration consists of three main entities, i.e., the fog computing provider, attacker, and cyber-insurer. …”
Get full text
Journal Article -
357
Signal recovery from multiple measurement vectors via tunable random projection and boost
Published 2013“…In this paper, we present a high-performance recovery method which mainly has two parts: a versatile recovery framework named RPMB and a high-performance algorithm for it. …”
Get full text
Get full text
Journal Article -
358
-
359
-
360