Mostrando 3,121 - 3,140 Resultados de 3,895 Para Buscar '"The Exploited"', tiempo de consulta: 0.07s Limitar resultados
  1. 3121
  2. 3122
    ...>/KGW Raman lasers operating at lime and orange wavelengths is presented. We exploit the LBO crystal...
    Enlace del recurso
    article
  3. 3123
    ... important component is an ability to detect innovative forms of exploitation and control concealed behind...
    Enlace del recurso
    article
  4. 3124
    por Mari Carmen Domingo
    Publicado 2021
    ...Smart seaside cities can fully exploit the capabilities brought by Internet of Things (IoT...
    Enlace del recurso
    article
  5. 3125
    por Hongwei Wei, Guanjun Lin, Lin Li, Heming Jia
    Publicado 2021
    ...Exploitable vulnerabilities in software systems are major security concerns. To date, machine...
    Enlace del recurso
    article
  6. 3126
    ... proposals available in the literature, the WuR system presented in this paper exploits the PHY...
    Enlace del recurso
    article
  7. 3127
    ... accuracy of 81%. Thus, the exploitation of multi-temporal datasets favored accurate VTs classification...
    Enlace del recurso
    article
  8. 3128
  9. 3129
    por Ngoc-Thanh Dinh, Younghan Kim
    Publicado 2021
    ... CS-based forwarding scheme for IoT. The proposed forwarding scheme exploits CS information...
    Enlace del recurso
    article
  10. 3130
    ... and transport of nanodrugs in living cells, and might provide a new drug exploitation strategy for cancer...
    Enlace del recurso
    article
  11. 3131
    por Lin Wang, Liu Liu, Xiaotong Zhou
    Publicado 2021
    ... in biofilm. These findings provide a potential method for the exploitation of organic composite nanomaterials...
    Enlace del recurso
    article
  12. 3132
  13. 3133
    ... the behavior of such nodes, and we validate it by means of extensive simulations. We also exploit Jackson...
    Enlace del recurso
    article
  14. 3134
    ... exploits the <italic>slow</italic> time-varying property of the NF. Specifically, only if the significant...
    Enlace del recurso
    article
  15. 3135
    por Youngki Park, Youhyun Shin
    Publicado 2021
    ... data from the web or exploiting custom-made machine learning algorithms. In this paper, we propose a...
    Enlace del recurso
    article
  16. 3136
    ... of cybercriminals, who exploit them to carry out potentially untraceable scams. The wide range of cryptocurrency...
    Enlace del recurso
    article
  17. 3137
    por Cuihong Long, Jiajun Han, Chengzhi Yi
    Publicado 2021
    ... exploit the enactment of the one-child policy in 1979 to construct instrumental variables capturing...
    Enlace del recurso
    article
  18. 3138
    por Ian Kaplan
    Publicado 2012
    ..., exploit the same plant volatile cues used by third trophic level carnivores. Further, hyperparasitoids...
    Enlace del recurso
    article
  19. 3139
    por Federico Comoglio, Renato Paro
    Publicado 2014
    ... of chromatin features and DNA replication timing has not yet been demonstrated. Here, by exploiting a...
    Enlace del recurso
    article
  20. 3140
    ... called TIF (Telomere Dysfunction-Induced Foci). We sought to exploit the TIF phenotype as marker...
    Enlace del recurso
    article