Academic Article RDF
pages:- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- more...
- Schedules with precedence restriction and position-dependent servicing durability
- Scheduling rules to minimize total tardiness in a parallel machine problem with setup and calendar constraints
- Schema mapping discovery from data instances
- Science d'ingénieurs et Sciences Pour l'Ingénieur : l'exemple du génie chimique
- Science through English or English through science?
- Scrap tyre pyrolysis: Are the effluents valuable products?
- Screening for Al2O3 failure in MCrAlY APS coatings using short-term oxidation at high temperature
- Scribble-based object segmentation with modified gaussian mixture models
- Script Based Migration Toolkit for Cloud Computing Architecture in Building Scalable Investment Platforms.
- Scrutinizing News Media Cooperation in Facebook and Twitter
- Sealer Penetration and Adaptation in the Dentinal Tubules: A Scanning Electron Microscopic Study
- Seam carving modeling for semantic video coding in security applications
- Seamless Handoff Solution For Nested Mobile Networks
- Seasonality of isoprene emissions and oxidation products above the remote Amazon
- Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels
- Sector Spillovers in Credit Markets
- Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
- Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes
- Secure Localization in the Presence of Colluders in WSNs
- Securely outsourcing the ciphertext-policy attribute-based encryption
- Securing Named Data Networking: Attribute-Based Encryption and Beyond
- Securities Prices are Set by Those at the Market's Margins
- Security and Privacy in Emerging Wireless Networks
- Security and privacy in IoT communication
- Security and Privacy in Smart Cities
- Security and privacy issues in cloud computing
- Security and trust in ubiquitous systems
- Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey
- Security in Transformer Visual Trackers: A Case Study on the Adversarial Robustness of Two Models
- Security Issues and Solutions in Smart Grid: FUSE-IT European Project Use-case