Found: 14
Select item for more details and to access through your institution.
De Novo Transcriptome Assembly and Comparative Analysis of Differentially Expressed Genes Involved in Cold Acclimation and Freezing Tolerance of the Arctic Moss Aulacomnium turgidum (Wahlenb.) Schwaegr.
- Published in:
- Plants (2223-7747), 2023, v. 12, n. 6, p. 1250, doi. 10.3390/plants12061250
- By:
- Publication type:
- Article
Box Office Forecasting considering Competitive Environment and Word-of-Mouth in Social Networks: A Case Study of Korean Film Market.
- Published in:
- Computational Intelligence & Neuroscience, 2017, p. 1, doi. 10.1155/2017/4315419
- By:
- Publication type:
- Article
Programming for High-Performance Computing on Edge Accelerators.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 4, p. 1055, doi. 10.3390/math11041055
- By:
- Publication type:
- Article
An Evaluation of Modern Accelerator-Based Edge Devices for Object Detection Applications.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 22, p. 4299, doi. 10.3390/math10224299
- By:
- Publication type:
- Article
High-resolution adaptive optical imaging within thick scattering media using closed-loop accumulation of single scattering.
- Published in:
- Nature Communications, 2017, v. 8, n. 1, p. 1, doi. 10.1038/s41467-017-02117-8
- By:
- Publication type:
- Article
ANALYZING INTERNATIONAL COLLABORATION AND IDENTIFYING CORE TOPICS FOR THE "INTERNET OF THINGS" BASED ON NETWORK ANALYSIS AND TOPIC MODELING.
- Published in:
- International Journal of Industrial Engineering, 2018, v. 25, n. 3, p. 349
- By:
- Publication type:
- Article
Identifying core topics in technology and innovation management studies: a topic model approach.
- Published in:
- Journal of Technology Transfer, 2018, v. 43, n. 5, p. 1291, doi. 10.1007/s10961-017-9561-4
- By:
- Publication type:
- Article
Draw-a-Deep Pattern: Drawing Pattern-Based Smartphone User Authentication Based on Temporal Convolutional Neural Network.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7590, doi. 10.3390/app12157590
- By:
- Publication type:
- Article
Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 19, p. 4018, doi. 10.3390/app9194018
- By:
- Publication type:
- Article
Toll Fraud Detection of Voip Services via an Ensemble of Novelty Detection Algorithms.
- Published in:
- International Journal of Industrial Engineering, 2015, v. 22, n. 2, p. 213
- By:
- Publication type:
- Article
Dynamic Algorithm Switching in Parallel Simulations using AOP.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 6, p. 1367, doi. 10.6688/JISE.201811_34(6).0002
- By:
- Publication type:
- Article
Solving the Cold-Start Problem in Short-Term Load Forecasting Using Tree-Based Methods.
- Published in:
- Energies (19961073), 2020, v. 13, n. 4, p. 886, doi. 10.3390/en13040886
- By:
- Publication type:
- Article
Bin2Vec: A Better Wafer Bin Map Coloring Scheme for Comprehensible Visualization and Effective Bad Wafer Classification.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 3, p. 597, doi. 10.3390/app9030597
- By:
- Publication type:
- Article
Function call interception techniques.
- Published in:
- Software: Practice & Experience, 2018, v. 48, n. 3, p. 385, doi. 10.1002/spe.2501
- By:
- Publication type:
- Article