Search

Your search keyword '"QA75"' showing total 8,477 results

Search Constraints

Start Over You searched for: Descriptor "QA75" Remove constraint Descriptor: "QA75"
8,477 results on '"QA75"'

Search Results

1. Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

2. A Multi-type Transferable Method for Missing Link Prediction in Heterogeneous Social Networks

3. Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models

4. Investigation of the Effect of e-Platform Information Security Breaches: A Small and Medium Enterprise Supply Chain Perspective

5. GeodesicEmbedding (GE): A High-Dimensional Embedding Approach for Fast Geodesic Distance Queries

6. Make Your Own Sprites

7. Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study

8. Towards Foundations of Categorical Cybernetics

9. Translating Extensive Form Games to Open Games with Agency

10. Benchmark computations for the polarization tensor characterization of small conducting objects

11. Stationary distribution and density function of a stochastic SVIR epidemic model

12. Maximum Torque Per Ampere Algorithm for Five-Phase Synchronous Reluctance Machines

13. Short and Long Range Relation Based Spatio-Temporal Transformer for Micro-Expression Recognition

14. Doubly stochastic scaling unifies community detection

15. Reconfigurable intelligent surface‐aided millimetre wave communications utilizing two‐phase minimax optimal stochastic strategy bandit

16. EMM-LC Fusion: Enhanced Multimodal Fusion for Lung Cancer Classification

17. A practical physical watermarking approach to detect replay attacks in a CPS

18. Real-Time Text Classification of User-Generated Content on Social Media: Systematic Review

19. Compound memory models

20. A Siamese Transformer Network for Zero-Shot Ancient Coin Classification

21. The need for a non-invasive technology for endometriosis detection and care

22. DeepWild : application of the pose estimation tool DeepLabCut for behaviour tracking in wild chimpanzees and bonobos

23. Multi-tier GPU virtualization for deep learning in cloud-edge systems

24. Belief propagation on networks with cliques and chordless cycles

25. Practical quantum advantage in quantum simulation

26. Exploring the future building: representational effects on projecting oneself into the future office space

27. A functional enhancement on scarred fingerprint using sigmoid filtering

28. Abusive Adversaries in 5G and Beyond IoT

29. Computational Design of Self-Actuated Deformable Solids via Shape Memory Material

30. Distribution-free risk analysis

31. Deep Learning Approaches for Automatic Localization in Medical Images

32. Epidemic Exposure, Financial Technology, and the Digital Divide

33. A Music Cognition–Guided Framework for Multi-pitch Estimation

34. Big data in action: An overview of big data studies in tourism and hospitality literature

35. Evaluation of 5G Coexistence and Interference Signals in the C-Band Satellite Earth Station

36. Comic Spin: A Comic Creation Tool Enabling Self-expression for People with Aphasia

37. Elastodynamics of a coated half-space under a sliding contact

38. Tempting the Fate of the furious: cyber security and autonomous cars

39. Supporting Visual Exploration of Iterative Job Scheduling

40. Provenance visualization: Tracing people, processes, and practices through a data-driven approach to provenance

41. DynamicRead: Exploring Robust Gaze Interaction Methods for Reading on Handheld Mobile Devices under Dynamic Conditions

42. Sentiment analysis of the Twitter response to Netflix's Our Planet documentary

43. Automated streamliner portfolios for constraint satisfaction problems

44. Infinite Horizon Extensive Form Games, Coalgebraically

45. Discovering students’ learning strategies in a visual programming MOOC through process mining techniques

46. Digital life as a cabaret, old chum : a dramaturgical analysis of older digitalised home residents and their wider caring networks

47. Augmenting ontology alignment by semantic embedding and distant supervision

48. ROMA: run-time object detection to maximize real-time accuracy

49. The impact of financial deprivation on children’s cybersecurity knowledge & abilities

50. Graph based CNN Algorithm to Detect Spammer Activity Over Social Media

Catalog

Books, media, physical & digital resources