Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
Blues (Música)
3
Música popular
3
Curtido de pieles
2
Música de Rhythm and blues
2
Música rock
2
Análisis (Filosofía)
1
Astronomía
1
Calzado
1
Campion, Albert (Personaje ficticio)--Ficción
1
Chile
1
Colonización agropecuaria
1
Comedy films
1
Cueros
1
Diccionarios
1
Fenomenología
1
Historia
1
Industria y comercio
1
Investigadores privados
1
Jazz
1
Jewelry
1
Joyas
1
Land Market
1
Mestizaje
1
Mestizos
1
Música instrumental
1
Música para películas cinematográficas
1
Música para saxofón (Blues)
1
Música vocal
1
Nombres personales ingleses
1
Novela estadounidense
1
-
2341por Aponte-Novoa, Fredy Andrés, Povedano Álvarez, Daniel, Villanueva-Polanco, Ricardo, Sandoval Orozco, Ana Lucila, García Villalba, Luis Javier“…Cryptojacking or illegal mining is a form of malware that hides in the victim’s computer and takes the computational resources to extract cryptocurrencies in favor of the attacker. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2342“…We design a hierarchical tree-like organization structure, GL-Tree, which enables the storage, management, and retrieval of massive location data and satisfies the user’s location-hiding requirements. We first use Geohash encoding to convert the two-dimensional geospatial coordinates of locations into one-dimensional strings and construct the GL-Tree based on the Geohash encoding principle. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2343por Bolton, Rosie, Campana, Simone, Ceccanti, Andrea, Espinal, Xavier, Fkiaras, Aristeidis, Fuhrmann, Patrick, Grange, Yan“…A layer of caching and latency hiding services, supporting various access protocols will serve the data to heterogeneous facilities, from conventional Grid sites to HPC centres and Cloud providers. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
-
2344por Rich, Eugene C.“…This superficial consensus hides intense disagreements over critical issues essential to any new public effort to promote more comparative effectiveness research (CER). …”
Publicado 2009
Enlace del recurso
Enlace del recurso
Enlace del recurso
Texto -
2345
-
2346
-
2347por Kelly, Peter J, Beck, Alison K, Baker, Amanda L, Deane, Frank P, Hides, Leanne, Manning, Victoria, Shakeshaft, Anthony, Larance, Briony, Neale, Joanne, Kelly, John, Oldmeadow, Christopher, Searles, Andrew, Treloar, Carla, Gray, Rebecca M, Argent, Angela, McGlaughlin, RyanEnlace del recurso
Publicado 2020
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2348por Kelly, Peter J, Beck, Alison K, Deane, Frank P, Larance, Briony, Baker, Amanda L, Hides, Leanne, Manning, Victoria, Shakeshaft, Anthony, Neale, Joanne, Kelly, John F, Oldmeadow, Christopher, Searles, Andrew, Palazzi, Kerrin, Lawson, Kenny, Treloar, Carla, Gray, Rebecca M, Argent, Angela, McGlaughlin, RyanEnlace del recurso
Publicado 2021
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2349por Kavanagh, David John, Connolly, Jennifer, Fisher, Jane, Halford, W Kim, Hamilton, Kyra, Hides, Leanne, Milgrom, Jeannette, Rowe, Heather, Scuffham, Paul A, White, Katherine M, Wittkowski, Anja, Appleton, Shelley, Sanders, DavinaEnlace del recurso
Publicado 2021
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2350por Zielesny, Achim“…The primary goal is to be as illustrative as possible without hiding problems and pitfalls but to address them. …”
Publicado 2016
Enlace del recurso
Enlace del recurso
-
2351por Kennedy, Kiley Elizabeth“…However, overwhelming evidence suggests that the theory is incomplete and that new physics may be hiding at the TeV scale. The Large Hadron Collider (LHC) at CERN probes these high-energy scales, opening a potential gateway to access physics beyond the Standard Model (BSM). …”
Publicado 2022
Enlace del recurso
-
2352por Padulano, Vincenzo Eduardo, Kabadzhov, Ivan Donchev, Tejedor Saavedra, Enric, Guiraud, Enrico, Alonso-Jordá, Pedro“…ROOT offers a modern analysis tool called RDataFrame, which can parallelise computations from a single machine to a distributed cluster while hiding most of the scheduling and result aggregation complexity from users. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
-
2353“…However, choosing the number of subclasses to display is often a complex task: on the one hand, assigning a limited number of colors to taxa of interest hides the structure imbedded in the subtrees of the taxonomy; on the other hand, differentiating a high number of taxa by giving them specific colors, without considering the underlying taxonomy, may lead to unreadable results since relationships between displayed taxa would not be supported by the color code. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2354por Whittaker, Jackie L, Ellis, Richard, Hodges, Paul William, OSullivan, Cliona, Hides, Julie, Fernandez-Carnero, Samuel, Arias-Buria, Jose Luis, Teyhen, Deydre S, Stokes, Maria JEnlace del recurso
Publicado 2019
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2355“…VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2356por Leung, Janni, Quinn, Catherine, Carlyle, Molly, Ellem, Rhiannon, Tisdale, Calvert, Davidson, Lily, White, Melanie J., Kavanagh, David J., Hides, LeanneEnlace del recurso
Publicado 2022
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2357por Olson, Mary M., Alhelou, Nay, Kavattur, Purvaja S., Rountree, Lillian, Winkler, Inga T.“…Policies raised awareness of menstruation, often with great noise, but they simultaneously called for hiding and concealing any actual, visible signs of menstruation and its embodied messiness. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2358“…The enrichment paradigm was composed of larger cages housing multiple mice that contained several toys, hiding places, nesting material and a spinning wheel that were moved or replaced at regular intervals. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2359“…In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
2360“…We observe internal and external coherence: The intensities of felt shame and of various motivations of shame (hiding, lying, destroying evidence, and threatening witnesses) vary in proportion (i) to one another, and (ii) to the degree to which audiences devalue the disgraced individual—the threat shame defends against. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto