429 results on '"Cova A"'
Search Results
2. Electrical Vehicle Fleet Management for Industrial Environment with Battery SoH Prediction Through Neural Networks.
3. Development of a cryogenic DC-DC Boost Converter: devices characterization and first prototype measurements.
4. DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
5. Modeling of a university campus Micro-Grid for optimal planning of renewable generation and storage deployment.
6. A Rule-Based Expert System for Automatic Implementation of Somatic Variant Clinical Interpretation Guidelines.
7. Effectiveness of Social Risk Screening in Ambulatory Clinics Indicates Potential Setting for Future Interventions
8. Presenting BLUE: A robot for localization in unstructured environments.
9. Speed Estimation for Control of an Unmanned Ground Vehicle using Extremely Low Resolution Sensors.
10. Bibliotecas BCRA: preservación, conservación y digitalización del acervo Institucional
11. Bibliotecas BCRA: misiones y funciones
12. Electrical Vehicle Fleet Management for Industrial Environment with Battery SoH Prediction Through Neural Networks
13. Analysis of Innovative 3D-Printed Direct Coolers for Modular Power Devices
14. A Resonant Converter with a Novel PCB-made High-Frequency Toroidal Coreless Transformer
15. GaN-based triple active bridge for avionic application.
16. An open-source software system for setting wildfire evacuation triggers.
17. Experience with endoluminal vacuum therapy for the management of upper gastrointestinal tract defects in a tertiary hospital
18. Criação e Uso de Simuladores Virtuais Como Ferramentas Educativas para o Ensino de Química na Educação Básica.
19. Metrological characterization of a cold plate test bench.
20. A main converter for future LHC experiments: Features measurement and reliability considerations.
21. Characterizing Multiple Formations for Gas Production and CO2 Sequestration
22. Reservoir Characterization for Gas Production and CO2 Sequestration
23. Redes verticales docentes en Proyectos Arquitectónicos: Arquitectura y Agua
24. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
25. EvilSeed: A Guided Approach to Finding Malicious Web Pages.
26. Fault tolerant digital control of 2 MVA parallelable frequency converters for harbor applications.
27. The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent.
28. HARMUR: storing and analyzing historic data on malicious domains.
29. Prophiler: a fast filter for the large-scale detection of malicious web pages.
30. Escape from Monkey Island: Evading High-Interaction Honeyclients.
31. System Security Research at Birmingham: Current Status and Some Future Work.
32. Peering through the iframe.
33. FEM Analysis of 3D Printable Finned Metal Liquid Cold Plates for Semiconductor Power Modules
34. Evitando una cirugía de Whipple: resección multimodal (incluyendo hot avulsion) en paciente con ampuloma recurrente y PAF
35. LA CÁPSULA ENDOSCÓPICA URGENTE, CLAVE EN EL MANEJO DE LA HEMORRAGIA GRAVE DE INTESTINO DELGADO
36. COLOPEXIA ENDOSCÓPICA PERCUTÁNEA PARA TRATAMIENTO DEL VÓLVULO DE SIGMA RECURRENTE.
37. Detection and analysis of drive-by-download attacks and malicious JavaScript code.
38. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners.
39. Organizing Large Scale Hacking Competitions.
40. An Analysis of Rogue AV Campaigns.
41. ADAL: A distributed range-free localization algorithm based on a mobile beacon for wireless sensor networks.
42. Analyzing and Detecting Malicious Flash Advertisements.
43. Your botnet is my botnet: analysis of a botnet takeover.
44. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
45. ClearShot: Eavesdropping on Keyboard Input from Video.
46. Are your votes really counted?: testing the security of real-world electronic voting systems.
47. Symbolic String Verification: An Automata-Based Approach.
48. Layout Considerations and Thermal Analysis of a 1.8 MHz Resonant VRM.
49. Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.
50. Multi-module vulnerability analysis of web-based applications.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.