Search

Your search keyword '"Renault, Eric"' showing total 88 results

Search Constraints

Start Over You searched for: Author "Renault, Eric" Remove constraint Author: "Renault, Eric" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
88 results on '"Renault, Eric"'

Search Results

1. Is the protactinium(V) mono-oxo bond weaker than what we thought?

2. Algorithm for AGC index management against crowded radio environment

3. Excited states of polonium(IV): Electron correlation and spin-orbit coupling in the Po^{4+} free ion and in the bare and solvated [PoCl5]^- and [PoCl6]^{2-} complexes

4. ML Comparison: Countermeasure Prediction Using Radio Internal Metrics for BLE Radio

5. Study of Masquerade Attack in VANETs with Machine Learning

6. Coordination and thermodynamic properties of aqueous protactinium(V) by first-principle calculations

7. Comparison of AI-Based Algorithms for Low Energy Communication

11. Coordination and thermodynamic properties of aqueous protactinium(V) by computational chemistry techniques

12. Efficient estimation of regression models with user-specified parametric model for heteroskedasticty

13. Arbitrage Pricing Theory for Idiosyncratic Variance Factors.

16. Modeling polonium complexes in solution

19. Excited states of polonium(IV): electron correlation and spin–orbit coupling in the Po4+ free ion and in the bare and solvated [PoCl5]− and [PoCl6]2− complexes.

23. IN-SAMPLE ASYMPTOTICS AND ACROSS-SAMPLE EFFICIENCY GAINS FOR HIGH FREQUENCY DATA STATISTICS.

26. Data Summarization for Federated Learning

27. Deep Reinforcement Learning for Multiobjective Scheduling in Industry 5.0 Reconfigurable Manufacturing Systems

28. SIP-DDoS: SIP Framework for DDoS Intrusion Detection Based on Recurrent Neural Networks

29. Toward A Digital Twin IoT for the Validation of AI Algorithms in Smart-City Applications

30. Detecting Abnormal Authentication Delays In Identity And Access Management Using Machine Learning

31. A Deep Learning Based Automatic Outdoor Home Video Surveillance Approach

32. Enhancing Social Media Profile Authenticity Detection: A Bio-Inspired Algorithm Approach

33. Machine Learning for IoT Devices Security Reinforcement

34. Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC Attributes

35. Cybersecurity Analytics: Toward an Efficient ML-Based Network Intrusion Detection System (NIDS)

36. Transformation Network Model for Ear Recognition

37. Attentive, Permutation Invariant, One-Shot Node-Conditioned Graph Generation for Wireless Networks Topology Optimization

38. A Novel Image Encryption Technique Using Modified Grain-128

39. Towards Road Profiling with Cooperative Intelligent Transport Systems

40. Machine Learning to Model the Risk of Alteration of Historical Buildings

41. Detecting Virtual Harassment in Social Media Using Machine Learning

42. Blockchain-Driven Animal Healthcare: Leveraging NFTs, IPFS, and Smart Contracts for Comprehensive Animal Medical Record

43. Enhancing Security in Connected Medical IoT Networks Through Deep Learning-Based Anomaly Detection

44. Transforming Child Health Records: Integrating Blockchain, NFTs, and IPFS for Enhanced Medical Data Management

45. Building the Shortest Path Database in Urban Traffic Network Using RAO Algorithm

46. A Smart Network Repository Based on Graph Database

47. Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy

48. Generating Synthetic Data to Improve Intrusion Detection in Smart City Network Systems

49. StrucTemp-GNN: An Intrusion Detection Framework in IoT Networks Using Dynamic Heterogeneous Graph Neural Networks

50. Applying Transfer Testing to Identify Annotation Discrepancies in Facial Emotion Data Sets

Catalog

Books, media, physical & digital resources