Search ResultsElectronic Resources 
by
Thomas, Tyler William, author.
Format:
Excerpt:
. Consequently, these tools are often used only by security experts or abandoned entirely. In this dissertation
by
Vaiana, Michael, author. (orcid)0000-0002-4955-4114
Format:
Excerpt:
drawing from the tools of topological data analysis using persistent homology to localize and segment
by
Burney, Micaela L., author.
Format:
Excerpt:
to hide messages, and further analyzes tools that both covertly hide information that includes hiding
by
Bush, Jeffrey Alan, author.
Format:
Excerpt:
distributions of mitochondria and endoplasmic reticulum relative to the branch points. Using these tools on a
by
Shaffer, Irene Rogan, author.
Format:
Excerpt:
facial expression recognition tools. Several considerations are given for constructing an unbiased
by
Etu, Egbe-Etu Emmanuel, author.
Format:
Excerpt:
prediction tool for analysis supersedes the utilization of simple statistical tools generally adopted by
by
Anderson, David, author.
Format:
Excerpt:
useful for future work on building program understanding and transformation tools to renovate PHP code
by
Stanley, Natalie, author.
Format:
Excerpt:
network, network analysis tools enable interpretation, prediction, and visualization of patterns in the
by
Abu Deeb, Fatima A., author.
Format:
Excerpt:
Spinoza could be used to build orchestration and debrieng tools. The Spinoza system was used extensively
by
Wu, Tao, author.
Format:
Excerpt:
Markov random walk models are powerful analytical tools for multiple areas in machine learning
by
Langendorf, R. E., author. (orcid)0000-0003-1956-0764
Format:
Excerpt:
answer the question (iii) `Which species in an ecosystem cause which other species?' These tools are part
by
Sidrow, Evan, author.
Format:
Excerpt:
Bayesian networks are widely considered as powerful tools for modeling risk assessment, uncertainty

Select an Action





