86 results on '"Proxy"'
Search Results
2. Quantifying Fairness and Discrimination in Predictive Models
3. Use of R-Based APIs (Application Programming Interface) to Obtain Data
4. Decision-Making Capacity
5. The Nature of Proxy Relationships and Their Ethics
6. Blockchain-Based Privacy-Preserving Electronics Healthcare Records in Healthcare 4.0 Using Proxy Re-Encryption
7. Hezbollah's Relation with Iran: The Proxy-Ally Debate and Wilayat al-Faqih’s Impact on Hezbollah’s Nature, Governance, and Legitimacy
8. A Simple Policy Update Method for the Sharing of Privatized Personal Health Information
9. FIDO2 Passwordless Authentication for Remote Devices
10. History Matching and Robust Optimization Using Proxies
11. Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers
12. Decisions Near the End of Life
13. Proxies, Caregivers and Care Home Residents
14. Proxy Measures for Quality of Life in Cancer
15. A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices
16. Advantages of Machine Learning in Networking-Monitoring Systems to Size Network Appliances and Identify Incongruences in Data Networks
17. Sampling Methodology for Assessing a Multi-proxy Bioavailable Strontium Isotope Baseline for the Orenburg Region (Russia): Fieldwork Results
18. X-Pro: Distributed XDP Proxies Against Botnets of Things
19. Iran’s Syria Strategy: The Evolution of Deterrence
20. The Power of Proxy Data and Proxy Networks for Hyper-parameter Optimization in Medical Image Segmentation
21. Analysis of Environmental Impacts of Infrastructure
22. Gender and Intersectionality: Complex World of Women Councillors
23. Upgradeability Concept for Collaborative Blockchain-Based Business Process Execution Framework
24. Development the Online Operating System of Urban Infrastructure Data
25. Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime
26. Holocene Hydroclimate of the Subtropical Mexico: A State of the Art
27. Boron Isotopes in Foraminifera: Systematics, Biomineralisation, and CO2 Reconstruction
28. Observer Effect: How Intercepting HTTPS Traffic Forces Malware to Change Their Behavior
29. Estimation of Body Size in Fossil Mammals
30. A New Scalable Botnet Detection Method in the Frequency Domain
31. An Elemental Fractionation Mechanism Common to Biogenic Calcium Carbonate
32. A Framework for Supporting Application Level Interoperability between IPv4 and IPv6
33. Protocol Conversion Approach to Include Devices with Administration Restriction on a Framework of Reference of Management Network
34. IT-Grundschutz ist Informantenschutz
35. Using Care Professionals as Proxies in the Design Process of Welfare Technology – Perspectives from Municipality Care
36. Civil Competence
37. Sponges as Proxies for Past Climate Change Events
38. Betreuung beantragen: 16 Lektionen für gesetzliche Betreuer zum Betreuungsrecht ohne Entmündigung
39. Staatliche Cyberkonflikte
40. A Basic Proxy System Design for Integrating Complicated Distributed Simulation Systems
41. AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling
42. Practical Application Layer Emulation in Industrial Control System Honeypots
43. A Self-configuration Web-API for the Internet of Things
44. Proxy
45. Nonintrusive SSL/TLS Proxy with JSON-Based Policy
46. Proposal for Easily Detachable Proxy for Personal Information Leakage Detection
47. Propagation of Behavioral Variations with Delegation Proxies
48. Caml Crush: A PKCS#11 Filtering Proxy
49. Institutionelle Stimmrechtsberatung. : Rechtstatsachen, Rechtsökonomik, rechtliche Rahmenbedingungen und Regulierungsstrategien.
50. Informed Consent, Proxy Consent, and Catholic Bioethics : For the Good of the Subject
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.