3,323 results on '"Jenkins, Paul"'
Search Results
2. Discography
3. Index
4. 10. Celebrating Life and Fifty Years Together
5. Appendix A: Interpretations
6. Cover
7. Appendix B: Solo Recordings
8. Bibliography
9. Title Page, Copyright, Dedication
10. 8. My Name's Music
11. 9. In the Classroom: The McLains as Educators
12. Notes
13. 4. Going Classical
14. 2. Berea and Beyond
15. 7. On the Road
16. 5. In the Studio
17. 3. All in the Family
18. Foreword
19. 6. Rosemary's Songs
20. Acknowledgments
21. Family Tree
22. 1. Beginnings
23. Preface
24. Cities of Entanglements: social life in Johannesburg and Maputo through ethnographic comparison by Barbara Heer (review)
25. The mutual arrangement of Wright-Fisher diffusion path measures and its impact on parameter estimation
26. Beyond the cacophony of the immediate and towards a preferable future: transformation of urban 'planning' in Africa
27. Studying urban planning education in Brazil and South Africa: challenges for decolonising the curriculum
28. Genealogical processes of non-neutral population models under rapid mutation
29. The effect of the trace operator on the duality of modular grids in genus zero levels
30. Sampling probabilities, diffusions, ancestral graphs, and duality under strong selection
31. Excursion theory for the Wright-Fisher diffusion
32. Understanding the Defence of Operational Technology (OT) Systems: A Comparison of Lockheed Martin’s Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model
33. AI Financial Adviser Performance and Monitoring of AI Derived Stocks
34. A Comparative Analysis of Threat Modelling Methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN
35. An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges
36. Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service (DDoS) Attacks
37. Challenges in Implementing Artificial Intelligence on the Raspberry Pi 4, 5 and 5 with AI HAT
38. Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack
39. Analysing Cyberattacks Using Attack Tree and Fuzzy Rules
40. Privacy and Security Landscape of Metaverse
41. EWF : simulating exact paths of the Wright--Fisher diffusion
42. An estimator for the recombination rate from a continuously observed diffusion of haplotype frequencies
43. Factor structure and measurement invariance of the Mood and Feelings Questionnaire: a cross-cultural study among Thai and British adolescents
44. Frederick Grant, Ghanaian Photographer
45. Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack
46. A survey of Scottish Committee for Orthopaedics and Trauma members on lower limb joint replacement practices in morbidly obese patients
47. ‘Breathe with Your Arms’: A Conductor's Experience Working on Concerto
48. Unregulated development of planned settlements: From plan to reality in Laulane, Maputo, Mozambique
49. An almost infinite sites model
50. Weak Convergence of Non-neutral Genealogies to Kingman's Coalescent
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.