Showing 3,901 - 3,920 results of 6,980 for search '((spinnae OR (((spingg OR yong) OR eng) OR hinges)) OR ((spinal OR pin) OR like))', query time: 0.16s Refine Results
  1. 3901

    Wrapped branes and punctured horizons by Bobev, N, Bomans, P, Gautason, FF

    Published 2019
    “…We show that some singular solutions of the Liouville equation have a physical interpretation as explicit point-like brane sources on the Riemann surface. We uncover the details of this picture by focusing on $\mathcal{N}$ = 1 theories of class $\mathcal{S}$ arising from M5-branes on a punctured Riemann surface. …”
    Internet publication
  2. 3902

    New approach to obtain height measurements from video by Criminisi, A, Zisserman, A, Van Gool, LJ, Bramble, SK, Compton, D

    Published 1999
    “…A height measurement is obtained from each frame of the video. A `stereo like' correspondence between images is not required. …”
    Conference item
  3. 3903

    Linguistic distance and market integration in India by Fenske, J, Kala, N

    Published 2021
    “…A one-standard-deviation increase in linguistic distance predicts a reduction in the price correlation between two markets of 0.121 standard deviations for wheat, 0.181 for salt, and 0.088 for rice. While factors like genetic distance, literacy gaps, and railway connections are correlated with linguistic distance, they do not fully explain the correlation between linguistic distance and market integration.…”
    Journal article
  4. 3904

    The uniqueness trap by Flyvbjerg, B, Budzier, A, Christodoulou, MD, Zottoli, M

    Published 2025
    “…Project managers and planners are highly prone to believing that their projects are one of a kind—partly because those that seem new and distinctive are more likely to win support. But research on 1,300-plus projects reveals that few, if any, actually are unique. …”
    Journal article
  5. 3905

    A contract negotiation scheme for safety verification of interconnected systems by Tan, X, Papachristodoulou, A, Dimarogonas, DV

    Published 2024
    “…In this paper, we show that compositional methods like AGC can mitigate this problem. We formulate the synthesis problem into a set of small-size problems, which constructs local contracts for subsystems, and propose a negotiation scheme among the subsystems at the contract level. …”
    Journal article
  6. 3906
  7. 3907
  8. 3908
  9. 3909
  10. 3910
  11. 3911
  12. 3912
  13. 3913
  14. 3914
  15. 3915
  16. 3916
  17. 3917

    Behaviorally informed digital campaigns and their association with social media engagement and COVID-19 vaccine uptake in Belize by Daga, Giuliana, Kossuth, Lajos, Boruchowicz, Cynthia, Lopez Boo, Florencia, Largaespada Beer, Natalia

    Published 2024
    “…However, lack of trust in the vaccine and fear of side effects in regions like the Caribbean resulted in a low uptake despite enough vaccine supply. …”
    Get full text
    Article
  18. 3918

    Creative AI : a data-driven design approach for creative online ad optimisation using artificial intelligence and big data by Phay, Han

    Published 2020
    “…Through the integration of Artificial Intelligence and Big Data with current industry processes, a new kind of advertising agency will emerge that is run like a tech company. Using Big Data to inform creative design and Artificial Intelligence to identify patterns, predictive analysis can be applied to creative online banner ads for the purpose of increasing user engagement through higher click-through rates. …”
    Get full text
    Thesis-Master by Research
  19. 3919
  20. 3920

    Two sides of the same coin : boons and banes of machine learning in hardware security by Liu, Wenye, Chang, Chip Hong, Wang, Xueyang, Liu, Chen, Fung, Jason M., Mohammad Ebrahimabadi, Karimi, Naghmeh, Meng, Xingyu, Basu, Kanad

    Published 2022
    “…ML schemes have been extensively used to enhance the security and trust of embedded systems like hardware Trojans and malware detection. On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically Unclonable Functions (PUFs). …”
    Get full text
    Journal Article