666 results on '"Batten A"'
Search Results
2. The Mere Fanciful Abstractions of Science
3. The Role of Glutamate Dysregulation in the Etiology of ADHD
4. MetaDetector: Detecting Outliers by Learning to Learn from Self-supervision
5. Abstract: MOOD 2020 : A Public Benchmark for Out-of-distribution Detection and Localization on Medical Images
6. A New Rabin-Type Cryptosystem with Modulus
7. Climate Change: Macroeconomic Impact and Implications for Monetary Policy
8. Nutrition and Hydration in Palliative Care and Their Diverse Meanings
9. Gas Sensing Using Monolayer MoS2
10. Efficiencies in Binary Elliptic Curves
11. Mobile Money in the Australasian Region - A Technical Security Perspective
12. A New Sign-Change Attack on the Montgomery Ladders
13. Smartphone Applications, Malware and Data Theft
14. Cryptographic Public Key Length Prediction
15. The 0-1 Knapsack Polytope – A Starting Point for Cryptanalysis of Knapsack Ciphers?
16. Interleukin 27
17. Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks
18. Algebraic Attacks on Clock-Controlled Stream Ciphers
19. Burnham, Sherburne Wesley
20. Struve, Friedrich Georg Wilhelm
21. An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones
22. Dynamic Measurement and Protected Execution: Model and Analysis
23. How to Characterise and Parameterise Agents in Electricity Market Simulation Models: The Case of Genersys
24. Security Management: An Information Systems Setting
25. Contrasting Permission Patterns between Clean and Malicious Android Applications
26. Designing Chip-Level Nanophotonic Interconnection Networks
27. Greenhouse Gas Balance and Algae-Based Biodiesel
28. An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss
29. Securing Data Privacy on Mobile Devices in Emergency Health Situations
30. Feature Reduction to Speed Up Malware Classification
31. Emergence and Co-Evolutionary Learning in Self-Organised Urban Development
32. Learning, Innovation and Urban Evolution: An Introduction
33. Using Relationship-Building in Event Profiling for Digital Forensic Investigations
34. Implementing Recovery in Low-Resource Stationary Wireless Sensor Networks
35. Paul Muldoon: Critical Judgement, the Crisis Poem, and the Ethics of Voice
36. Network Resilience in Low-Resource Mobile Wireless Sensor Networks
37. An Anonymity Revocation Technology for Anonymous Communication
38. Robust Correctness Testing for Digital Forensic Tools
39. A Privacy Preserving E-Payment Scheme
40. Simple Memes and Complex Cultural Dynamics
41. Designing Information Systems Which Manage or Avoid Privacy Incidents
42. A Trusted Approach to E-Commerce
43. Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
44. Seizures and Anti-Epileptic Drugs in Neuro-Oncology
45. Growth, survival, and tag retention of steelhead trout (O. mykiss) surgically implanted with dummy acoustic tags
46. Diseases Dominate
47. Infrastructure and the Complexity of Economic Development: An Exploratory Introduction
48. Algebraic Attacks on Clock-Controlled Cascade Ciphers
49. A Self-organising Sensing System for Structural Health Management
50. Wright, William Hammond
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.