Search

Your search keyword '"Muriel P"' showing total 620 results

Search Constraints

Start Over You searched for: Author "Muriel P" Remove constraint Author: "Muriel P" Publication Type Reports Remove constraint Publication Type: Reports
620 results on '"Muriel P"'

Search Results

1. Using the STIX background detector as a proxy for GOES

2. Turbo product decoding of cubic tensor codes

3. Volumetric (dilatant) plasticity in geodynamic models and implications on thermal dissipation and strain localization

4. Soft-Output Successive Cancellation List Decoding

5. Classification of traveling wave solutions of the modified Zakharov--Kuznetsov equation

6. Using a Single-Parity-Check to Reduce the Guesswork of Guessing Codeword Decoding

7. Error correction in interference-limited wireless systems

8. MultiTok: Variable-Length Tokenization for Efficient LLMs Adapted from LZW Compression

9. Dust sub-mm emission in Green Valley galaxies

10. The observational evidence that all microflares that accelerate electrons to high energies are rooted in sunspots

11. Enhancing 5G Performance: Reducing Service Time and Research Directions for 6G Standards

12. Hybrid patterns and solitonic frequency combs in non-Hermitian Kerr Cavities

13. Observation of Space-Dependent Rotational Doppler Shifts with a Single Ion Probe

14. Soft-output Guessing Codeword Decoding

15. Long-Term Effects of Hiring Subsidies for Low-Educated Unemployed Youths

16. Towards objective and interpretable speech disorder assessment: a comparative analysis of CNN and transformer-based models

17. Spectral sequences via linear presheaves

18. A Monotone Circuit Construction for Individually-Secure Multi-Secret Sharing

19. Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems

20. QBER: Quantifying Cyber Risks for Strategic Decisions

21. On the Benefits of Coding for Network Slicing

22. A mid-infrared dual-comb spectrometer in step-sweep mode for high-resolution molecular spectroscopy

23. QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience

24. A prop structure on partitions

25. Successive Refinement in Large-Scale Computation: Advancing Model Inference Applications

26. Near-Optimal Generalized Decoding of Polar-like Codes

27. TexShape: Information Theoretic Sentence Embedding for Language Models

28. Dark resonance spectra of trapped ions under the influence of micromotion

29. Multimaterial Inkjet Printing of Mechanochromic Materials

30. Anytime-Valid Tests of Group Invariance through Conformal Prediction

31. Manipulating the wavelength of single photons in insulating van der Waals heterostructures: theory and application to bilayer hexagonal boron nitride

32. Optimal Binary Differential Privacy via Graphs

33. Reactor antineutrino flux and anomaly

34. Soft-output (SO) GRAND and Iterative Decoding to Outperform LDPCs

35. CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation

36. Generalized Rainbow Differential Privacy

37. Integration of differential equations by $\mathcal{C}^{\infty}$-structures

38. Explainable Multi-View Deep Networks Methodology for Experimental Physics

39. CERMET: Coding for Energy Reduction with Multiple Encryption Techniques -- $It's\ easy\ being\ green$

40. Backsplash galaxies and their impact on galaxy evolution: a three-stage, four-type perspective

41. RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

42. Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS Servers

43. Practical Sliding Window Recoder: Design, Analysis, and Usecases

44. Blockage Prediction in Directional mmWave Links Using Liquid Time Constant Network

45. $\mathcal{C}^{\infty}$-structures in the integration of involutive distributions

46. Upgrade error detection to prediction with GRAND

47. A Non-Asymptotic Analysis of Mismatched Guesswork

48. Improved ACOM pattern matching in 4D STEM through adaptive sub pixel peak detection and image reconstruction

49. Exponential Stochastic Inequality

50. SECAdvisor: a Tool for Cybersecurity Planning using Economic Models

Catalog

Books, media, physical & digital resources