Showing 1–17 of 17 results
/ Date/ Name
Dec 15, 2018Enumeration, structural and dimensional synthesis of robotic hands: theory and implementationJun 16, 2018Attack Surface Metrics and Privilege-based Reduction Strategies for Cyber-Physical SystemsOct 17, 2018Cyber Threat Impact Analysis to Air Traffic Flows Through Dynamic Queue NetworksOct 9, 2019Phase-Modulated Interferometry, Spectroscopy, and Refractometry using Entangled Photon PairsJun 24, 2021Deep Learning and Crystal Plasticity: A Preconditioning Approach for Accurate Orientation Evolution PredictionApr 17, 2020The 2-rank of the class group of some real cyclic quartic number fields IIJun 20, 2025PUL: Pre-load in Software for Caches Wouldn't Always Play AlongDec 21, 2023Deep mouse brain two-photon near-infrared fluorescence imaging using a superconducting nanowire single-photon detector arrayApr 17, 2020The 2-rank of the class group of some real cyclic quartic number fieldsJan 3, 199612C(p,n)12N reaction at 135 MeVJan 19, 2025Self-CephaloNet: A Two-stage Novel Framework using Operational Neural Network for Cephalometric AnalysisJun 21, 2020Fluorescence-detected Fourier transform electronic spectroscopy by phase-tagged photon countingJan 18, 2026Bringing Data Transformations Near-Memory for Low-Latency Analytics in HTAP EnvironmentsOct 31, 2019Deep learning assessment of breast terminal duct lobular unit involution: towards automated prediction of breast cancer riskJun 21, 2016Crowdsourcing scoring of immunohistochemistry images: Evaluating Performance of the Crowd and an Automated Computational MethodJul 21, 2024Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research DirectionsMar 25, 2016A Scheduler for Unsolicited Grant Service (UGS) in IEEE 802.16e Mobile WiMAX Networks