300 results on '"Grier, A."'
Search Results
2. Deep inference of latent dynamics with spatio-temporal super-resolution using selective backpropagation through time.
3. CAR-T Party in the Lungs: A Case of Immune-Mediated Pneumonitis
4. Evaluation of Early Lung Cancer Detection in a Population at High Risk Due to Occupation: Eligibility Criteria and Impact
5. Ultrasound Guided Chest Tube Lodged in the Right Main Stem Bronchus Ultrasound Guided Chest Tube Lodged in the Right Main Stem Bronchus
6. Environmental and Military Exposures Among Veterans and Their Association With Lung Cancer Histologic Subtypes
7. Thunder and lightning: a revolution in wave-matter interactions
8. ODSA: Open Database Storage Access.
9. Interactive shallow Clifford circuits: quantum advantage against NC¹ and beyond.
10. SysGen: system state corpus generator.
11. A Quantum Query Complexity Trichotomy for Regular Languages.
12. Process Evaluations for Stereolithographic Printing of Cristobalite
13. New Hardness Results for the Permanent Using Linear Optics.
14. Detecting Database File Tampering through Page Carving.
15. ETERNAL: Encrypted Transmission With an Error-correcting, Real-time, Noise-resilient Apparatus on Lightweight Devices.
16. The Classification of Reversible Bit Operations.
17. Using semantic web technologies to power LungMAP, a molecular data repository.
18. A Descriptive Analysis of Lung Cancer Screening in Baltimore, Maryland
19. Screening Beyond the Nodule: Annual LDCT as a Screening Tool for Other Comorbid Conditions
20. On the Complexity of Probabilistic Trials for Hidden Satisfiability Problems.
21. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
22. Game Values and Computational Complexity: An Analysis via Black-White Combinatorial Games.
23. Holographic molecular binding assays
24. Database Forensic Analysis with DBCarver.
25. Hulk: Eliciting Malicious Behavior in Browser Extensions.
26. Mobile Learning Perspectives from the United States: Superintendents and Researchers Share Experiences and Insights.
27. Characterizing Large-Scale Click Fraud in ZeroAccess.
28. Dialing Back Abuse on Phone Verified Accounts.
29. Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
30. Deciding the Winner of an Arbitrary Finite Poset Game Is PSPACE-Complete.
31. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
32. Understanding the domain registration behavior of spammers.
33. Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
34. Manufacturing compromise: the emergence of exploit-as-a-service.
35. A Reconfigurable Computing System Based on a Cache-Coherent Fabric.
36. Suspended accounts in retrospect: an analysis of twitter spam.
37. Design and Evaluation of a Real-Time URL Spam Filtering Service.
38. Click Trajectories: End-to-End Analysis of the Spam Value Chain.
39. What's Clicking What? Techniques and Innovations of Today's Clickbots.
40. Toward improving unmanned underwater vehicle sensing operations through characterization of the impacts and limitations of in situ environmental conditions
41. Alhambra: a system for creating, enforcing, and testing browser security policies.
42. unFriendly: Multi-party Privacy Risks in Social Networks.
43. @spam: the underground on 140 characters or less.
44. The Multi-Principal OS Construction of the Gazelle Web Browser.
45. Secure Web Browsing with the OP Web Browser.
46. Manufacturing Decision-support Using Interactive Meta-Goal Programming.
47. Framing Dependencies Introduced by Underground Commoditization.
48. RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises.
49. Evaluation of 3D Fluoroscopy Aiding Robotic Assisted Bronchoscopy for Biopsy of Peripheral Lung Nodules
50. Assessing the Use of Risk Prediction Model in Pulmonary Nodule Clinic in the Veteran Population
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.