Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artículo
|
![]() |
Computer-aided calculation of accident costsAaltonen, Markku V.P. ; Miettinen, JukkaHuman factors and ergonomics in manufacturing & service industries, 1997, Vol.7 (2), p.67-78 [Revista revisada por pares]New York: John Wiley & Sons, IncTexto completo disponible |
2 |
Material Type: Artículo
|
![]() |
An Efficient Solver for Two‐way Coupling Rigid Bodies with Incompressible FlowAanjaneya, MridulComputer graphics forum, 2018-12, Vol.37 (8), p.59-68 [Revista revisada por pares]Oxford: Blackwell Publishing LtdTexto completo disponible |
3 |
Material Type: Artículo
|
![]() |
Deep recurrent neural network‐based Aquila optimization‐based online shaming emotion analysisAarthi, B. ; Chelliah, Balika J.Concurrency and computation, 2022-05, Vol.34 (11), p.n/a [Revista revisada por pares]Hoboken, USA: John Wiley & Sons, IncTexto completo disponible |
4 |
Material Type: Artículo
|
![]() |
A product formula for the TASEP on a ringAas, Erik ; Sjöstrand, JonasRandom structures & algorithms, 2016-03, Vol.48 (2), p.247-259 [Revista revisada por pares]Hoboken: Blackwell Publishing LtdTexto completo disponible |
5 |
Material Type: Artículo
|
![]() |
Cloud incident handling and forensic‐by‐design: cloud storage as a case studyAb Rahman, Nurul Hidayah ; Cahyani, Niken Dwi Wahyu ; Choo, Kim‐Kwang RaymondConcurrency and computation, 2017-07, Vol.29 (14), p.n/a [Revista revisada por pares]Hoboken: Wiley Subscription Services, IncTexto completo disponible |
6 |
Material Type: Artículo
|
![]() |
An empirical analysis for software robustness vulnerability in terms of modularity qualityAbadeh, Maryam Nooraei ; Mirzaie, MansoorehSystems engineering, 2023-11, Vol.26 (6), p.754-769 [Revista revisada por pares]Hoboken: Wiley Subscription Services, IncTexto completo disponible |
7 |
Material Type: Artículo
|
![]() |
The UNITE database for molecular identification of fungi – recent updates and future perspectivesAbarenkov, Kessy ; Nilsson, R. Henrik ; Larsson, Karl-Henrik ; Alexander, Ian J. ; Eberhardt, Ursula ; Erland, Susanne ; Høiland, Klaus ; Kjøller, Rasmus ; Larsson, Ellen ; Pennanen, Taina ; Sen, Robin ; Taylor, Andy F. S. ; Tedersoo, Leho ; Ursing, Björn M. ; Vrålstad, Trude ; Liimatainen, Kare ; Peintner, Ursula ; Kõljalg, UrmasThe New phytologist, 2010-04, Vol.186 (2), p.281-285 [Revista revisada por pares]Oxford, UK: Blackwell PublishingTexto completo disponible |
8 |
Material Type: Artículo
|
![]() |
Applications and techniques in information and network securityAbawajy, Jemal H. ; Islam, RafiqulConcurrency and computation, 2017-12, Vol.29 (23), p.n/a [Revista revisada por pares]Hoboken: Wiley Subscription Services, IncTexto completo disponible |
9 |
Material Type: Artículo
|
![]() |
Vertex re-identification attack using neighbourhood-pair propertiesAbawajy, Jemal ; Ninggal, Mohd Izuan Hafez ; Herawan, TututConcurrency and computation, 2016-07, Vol.28 (10), p.2906-2919 [Revista revisada por pares]Blackwell Publishing LtdTexto completo disponible |
10 |
Material Type: Artículo
|
![]() |
A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous datasetAbayomi‐Alli, Olusola ; Misra, Sanjay ; Abayomi‐Alli, AdebayoConcurrency and computation, 2022-08, Vol.34 (17), p.n/a [Revista revisada por pares]Hoboken, USA: John Wiley & Sons, IncTexto completo disponible |