Search

Your search keyword '"Nemati A"' showing total 67 results

Search Constraints

Start Over You searched for: Author "Nemati A" Remove constraint Author: "Nemati A" Publication Type eBooks Remove constraint Publication Type: eBooks
67 results on '"Nemati A"'

Search Results

1. Assessing Consumers’ Embrace of the Internet of Things

3. RSV-SLAM: Toward Real-Time Semantic Visual SLAM in Indoor Dynamic Environments

6. AI Makes Crypto Evolve

10. Crypto Makes AI Evolve

12. Evaluation of Performance of Pilot-Scale Engineered Permeable Bio-barriers for Removal of Nitrogenous Compounds from Waters Contaminated with Manure Slurry

13. A Case Study in Information Flow Refinement for Low Level Systems

16. Acceptance of Robotic Transportation in Small Workshops: A China-Iran Cross-Cultural Study

17. Design and Fabrication of a Floating Social Robot: CeB the Social Blimp

18. A Comparison of Approaches for Synchronizing Events in Video Streams Using Audio

20. Hollow Magnetic Nanoparticles

21. Predicting Kidney Transplant Survival Using Multiple Feature Representations for HLAs

25. MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation

26. Validation of Abstract Side-Channel Models for Computer Architectures

27. Spatio-Temporal Model-Checking of Cyber-Physical Systems Using Graph Queries

29. A Comparison of Transfer Learning Techniques, Deep Convolutional Neural Network and Multilayer Neural Network Methods for the Diagnosis of Glaucomatous Optic Neuropathy

30. Companion Transporter: A Co-worker in the Greenhouse

31. A Fused Pattern Recognition Model to Detect Glaucoma Using Retinal Nerve Fiber Layer Thickness Measurements

34. Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels

38. Retracted: A Novel Voting Mathematical Rule Classification for Image Recognition

39. Infrastructure Mapping in Well-Structured Environments Using MAV

43. Trustworthy Virtualization of the ARMv7 Memory Subsystem

44. Trustworthy Prevention of Code Injection in Linux on Embedded Devices

45. Trustworthy Memory Isolation of Linux on Embedded Devices

46. Semi-supervised Local Aggregation Methodology

47. A Robust Clustering via Swarm Intelligence

48. Multitask Reinforcement Learning in Nondeterministic Environments: Maze Problem Case

Catalog

Books, media, physical & digital resources