Search

Your search keyword '"Asokan P"' showing total 1,972 results

Search Constraints

Start Over You searched for: Author "Asokan P" Remove constraint Author: "Asokan P"
1,972 results on '"Asokan P"'

Search Results

1. Tidings from the Tides–De novo transcriptome assembly of the endemic estuarine bivalve Villorita cyprinoides

2. Synergy Unleashed: Piezo–Tribo Hybrid Harvester for Sustainable Power Generation Toward Augmented and Virtual Reality Applications

3. Effect of lignocellulosic corn stalk on mechanical, physical, and thermal properties of injection moulded low density polyethylene composites: An approach towards a circular economy

4. The Indian consensus statement for the management of lower extremity peripheral artery disease

5. CROSS-JEM: Accurate and Efficient Cross-encoders for Short-text Ranking Tasks

6. Orange Chromide, Pseudetroplus maculatus (Bloch., 1795): A Potential Euryhaline Fish Model to Evaluate Climate Change Adaptations in Fishes

7. Leveraging Self-Supervised Learning for Fetal Cardiac Planes Classification using Ultrasound Scan Videos

8. A Federated Learning-Friendly Approach for Parameter-Efficient Fine-Tuning of SAM in 3D Segmentation

9. Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations

10. BliMe Linter

11. Cancellable Memory Requests: A transparent, lightweight Spectre mitigation

12. Unveiling Highly Sensitive Active Site in Atomically Dispersed Gold Catalysts for Enhanced Ethanol Dehydrogenation

13. Myocardial infarction causes sex-dependent dysfunction in vagal sensory glutamatergic neurotransmission that is mitigated by 17β-estradiol.

14. Espresso: Robust Concept Filtering in Text-to-Image Models

15. DeiT-LT Distillation Strikes Back for Vision Transformer Training on Long-Tailed Datasets

16. Experimental realization of universal quantum gates and six-qubit state using photonic quantum walk

20. SeMalloc: Semantics-Informed Memory Allocator

21. S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More

22. Data-Oblivious ML Accelerators using Hardware Security Extensions

23. The Spectre of Surveillance and Censorship in Future Internet Architectures

24. Quantum illumination using polarization-entangled photon pairs for enhanced object detection

25. Employing Approximate Symmetries for Hidden Pole Extraction

26. SoK: Unintended Interactions among Machine Learning Defenses and Risks

33. Leveraging Vision-Language Models for Improving Domain Generalization in Image Classification

37. Transforming Marble Waste into High-Performance, Water-Resistant, and Thermally Insulative Hybrid Polymer Composites for Environmental Sustainability

38. Domain-Specificity Inducing Transformers for Source-Free Domain Adaptation

39. Attesting Distributional Properties of Training Data for Machine Learning

40. A User-centered Security Evaluation of Copilot

41. FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks

42. Parallel and Asynchronous Smart Contract Execution

43. GANs Settle Scores!

44. Data Interpolants -- That's What Discriminators in Higher-order Gradient-regularized GANs Are

45. Administration of anti-HIV-1 broadly neutralizing monoclonal antibodies with increased affinity to Fcγ receptors during acute SHIVAD8-EO infection

48. A humanized mouse model for adeno-associated viral gene therapy

Catalog

Books, media, physical & digital resources