Search

Showing total 50,604 results

Search Constraints

Start Over You searched for: Publication Year Range This year Remove constraint Publication Year Range: This year Publication Type Trade Publications Remove constraint Publication Type: Trade Publications Publication Type eBooks Remove constraint Publication Type: eBooks
50,604 results

Search Results

4. Monsanto papers : Désinformation médiatique

5. Paper Soldiers : How the Weaponization of the Dollar Changed the World Order

8. A Comparative Study of Computational Linguistics Terminology in English Papers by Chinese and American Scholars

9. Paper Dragons : The Fight for the Hidden Realm

10. Paper Cage : A Novel

11. Task-Specific Model Allocation Medical Papers PICOS Information Extraction

14. Short Paper: DeFi Deception—Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects

15. Short Paper: Estimating Patch Propagation Times Across Blockchain Forks

19. Hypergraphs for Frailty Analysis Research Paper

20. Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy

21. Energy Efficiency Impact of Processing in Memory: A Comprehensive Review of Workloads on the UPMEM Architecture

22. Anxiety Among Migrants - Questions for Agent Simulation

23. Temporal Hái in Mandarin Chinese Revisited: A Presuppositional Account

24. Two Steps Forward and One Behind: Rethinking Time Series Forecasting with Deep Learning

25. CardiacSeg: Customized Pre-training Volumetric Transformer with Scaling Pyramid for 3D Cardiac Segmentation

26. Proposal of Principles of DeFi Disclosure and Regulation

28. Applications and Associated Challenges in Deployment of Software Defined Networking (SDN)

29. Performance Analysis for Web Scraping Tools: Case Studies on Beautifulsoup, Scrapy, Htmlunit and Jsoup

30. Formation of a Speech Database in the Karakalpak Language for Speech Synthesis Systems

31. Novel Quaternion Orthogonal Fourier-Mellin Moments Using Optimized Factorial Calculation

32. Original Entry Point Detection Based on Graph Similarity

33. Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code

34. A Novel Bayes’ Theorem for Upper Probabilities

35. Continuous Integration, Delivery and Deployment: A Systematic Review of Approaches, Tools, Challenges and Practices

36. Optimized BERT Model for Question Answering System on Mobile Platform

37. The Impact of Tamil Python Programming in Wikisource

39. Prompt Engineering, An Alternative for Video Game Development?

40. Design Thinking: Empowering Innovation and Transformation in Industry 4.0 - Lessons Learned from Early Adoption in SMEs

41. Workshop on Cybersecurity of Critical Infrastructures

42. Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development

43. A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs

44. On Elementary Second Order Cellular Automata

45. QuMaDe: Quick Foreground Mask and Monocular Depth Data Generation

46. Smart Parking System Using Arduino and IR Sensor