73 results on '"Knight, William"'
Search Results
2. Intelligent Control of Combined Sewer Systems Using Pyswmm -- a Python Wrapper for Epa's Stormwater Management Model
3. Pseudonymisation of neuroimages and data protection: Increasing access to data while retaining scientific utility
4. Endoscopic tumour morphology impacts survival in adenocarcinoma of the oesophagus
5. Gastric tumours
6. Louisiana Reentry Court Promotes Seamless Transition between Sentencing, Incarceration and Post Release Services Some Potential Exportable Elements
7. Exploring support for shale gas extraction in the United Kingdom
8. Electroencephalography findings in patients presenting to the ED for evaluation of seizures
9. A Matched Comparison of Eptifibatide Plus rt-PA Versus rt-PA Alone in Acute Ischemic Stroke
10. The incidence of seizures in patients undergoing therapeutic hypothermia after resuscitation from cardiac arrest
11. Duplication of amyloid precursor protein (APP), but not prion protein (PRNP) gene is a significant cause of early onset dementia in a large UK series
12. Audit of handover practice in orthopaedics and trauma – Can improvements be made?
13. Helicopter Scene Response for a STEMI Patient Transported Directly to the Cardiac Catheterization Laboratory
14. Reperfusion Is Delayed Beyond Guideline Recommendations in Patients Requiring Interhospital Helicopter Transfer for Treatment of ST-segment Elevation Myocardial Infarction
15. A smart phone?
16. Spamming the socially active
17. License to hack
18. Information security in China: A license to print money
19. High noon for virtualisation
20. The evolution of AV
21. The right tools for the job
22. Through Hell and high water
23. Critical Burn Patient with an Unknown Neuromuscular Disease: Conclusion
24. Critical Burn Patient with an Unknown Neuromuscular Disease
25. Strength in numbers
26. A little less conversation, a little more security please
27. Coughs and sneezes spread diseases
28. The price of love
29. Danger on the drugs network
30. A fairy tale: perfect database security
31. Fighting over keeping hackers in check
32. The return of the Phreak
33. Click fraud is just another business tax
34. Computers that learn to spot the odd one out
35. Looking for a hardware hero
36. Locking up the Grid
37. With map and compass through the threat landscape
38. VPN boom bewilders users
39. Aventail tunnels for more business
40. Ribosome Builder: A software project to simulate the ribosome
41. Security — built-in or bolted-on to the SOA?
42. A Time-resolved Investigation of Ribosomal Subunit Association
43. Firewalls ring changes
44. Worm cure is a hard act
45. Brace yourselves for the IM-plosion
46. IBM Joins Liberty Alliance
47. Mobile working drives switch to federated access rights
48. Compost convective airflow under passive aeration
49. SE—Structures and Environment
50. Memory intensive statistical algorithms for multibeam bathymetric data
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.