1,802 results
Search Results
2. Torn-Paper Coding.
3. Explicit Determinants of the k-Fibonacci and k-Lucas RSFPLR Circulant Matrix in Codes
4. Determinants of the RSFMLR and RSLMFL Circulant Matrices Involving Four Famous Numbers in Codes
5. Broadcast Attacks against Code-Based Schemes
6. Key Predistribution Schemes Using Codes in Wireless Sensor Networks
7. The Colour of Time (God Is a Lobster and Other Forbidden Bodies)
8. How Many Figure Sets Are Codes?
9. Political connections and financial performance: the moderating role of director efficacy
10. LES ABREVIACIONS: AL CAP DE TRENTA-VUIT ANYS DE LA PUBLICACIÓ DE L'ARTICLE "ABREVIACIONS: UN ASSAIG DE CLASSIFICACIÓ TIPOLÒGICA".
11. Convergence and compliance of corporate governance codes: a study of 11 Asian emerging economies
12. Writing on wet paper.
13. Critique of “MemXCT: Memory-Centric X-Ray CT Reconstruction With Massive Parallelization” by SCC Team From the University of Texas at Austin.
14. Evaluating the effectiveness of corporate boards
15. Justice : Security and Justice Thematic Paper
16. A Study of Some American Classic Westerns Based on Roland Barthes's Theory of Semiotics.
17. The CAESAR Project for the ASI Space Weather Infrastructure
18. Critique of “MemXCT: Memory-Centric X-Ray CT Reconstruction With Massive Parallelization” by SCC Team From ETH Zürich.
19. The evolution of business ethics research in the realm of tourism and hospitality : A bibliometric analysis
20. Cryptography : A security pillar of privacy, integrity and authenticity of data communication
21. An evaluation of implementing Koha in a Chinese language environment
22. A Step-by-Step Process of Thematic Analysis to Develop a Conceptual Model in Qualitative Research.
23. A class of non‐linear asymptotic fingerprinting codes with ϵ‐error
24. Screenness and organizing: sociomaterial practices in mediated worlds
25. Public‐key coding system based on grey generation and braid group
26. SOCIAL ISSUES IN MANAGEMENT Conference Paper Abstracts.
27. Advances in video networking: standards and applications
28. A counterfeit network analyzer based on RFID and EPC
29. Adaptive SNR estimation algorithms for decoding block turbo codes
30. MHS: a context‐enabled regulated framework for pervasive services
31. The software implementation of decoding for RS code based on a new degree computationless modified Euclid (DCME) algorithm
32. Grounded theory in practice: issues and discussion for new qualitative researchers
33. Corporate governance challenges in Poland: evidence from “comply or explain” disclosures
34. Research of an improved BP decoding arithmetic
35. Exploiting narrow values for faster parity generation
36. RFID‐enabled supply chain systems with computer simulation
37. Enlarged EU: enlarged corporate governance? Why directives might be more appropriate for transition economies
38. Mapping industrial marketing knowledge: a study of an IMP conference
39. A vision of the Internet in 2010
40. Weight Enumerators and Cardinalities for Number-Theoretic Codes.
41. Validation of microcontroller codes: an architecture oriented approach
42. QR codes in the library
43. Modeling and numerical simulation of laser matter interaction and ablation with a 193 nanometer laser for nanosecond pulse
44. Recommendations for health reporting: Proposal of a working paper.
45. The application of high‐density codes in engineering
46. Reducing earthquake risk to non‐engineered buildings in Indonesia
47. Scalable combined H.264/distributed video coding
48. Rate control in H.264 wireless video communication system
49. Algorithms for generating generalized gray codes
50. Coding system for rapid prototyping industry
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.