X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (120) 120
Newspaper Article (56) 56
Conference Proceeding (52) 52
Patent (49) 49
Magazine Article (23) 23
Publication (15) 15
Dissertation (12) 12
Book Review (6) 6
Book / eBook (4) 4
Book Chapter (3) 3
Trade Publication Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
electricity (30) 30
index medicus (29) 29
humans (26) 26
physics (26) 26
calculating (19) 19
computing (19) 19
counting (19) 19
electric digital data processing (18) 18
basic electric elements (17) 17
electric solid state devices not otherwise provided for (15) 15
female (15) 15
semiconductor devices (15) 15
male (14) 14
privacy (14) 14
families & family life (13) 13
electric communication technique (11) 11
middle aged (11) 11
research (11) 11
adult (10) 10
analysis (10) 10
computer science - cryptography and security (10) 10
measuring (10) 10
measuring electric variables (10) 10
measuring magnetic variables (10) 10
testing (10) 10
decoding (8) 8
india (8) 8
aged (7) 7
animals (7) 7
climate change mitigation technologies in information andcommunication technologies [ict], i.e. information andcommunication technologies aiming at the reduction of thir ownenergy use (7) 7
computer science, software engineering (7) 7
computer science, theory & methods (7) 7
cryptography (7) 7
general tagging of cross-sectional technologies spanning over several sections of the ipc (7) 7
general tagging of new technological developments (7) 7
technical subjects covered by former uspc cross-reference art collections [xracs] and digests (7) 7
technologies or applications for mitigation or adaptation againstclimate change (7) 7
follow-up studies (6) 6
internet (6) 6
prognosis (6) 6
risk factors (6) 6
security (6) 6
social networks (6) 6
studies (6) 6
surgery (6) 6
switches (6) 6
algorithms (5) 5
computer science (5) 5
computer science, hardware & architecture (5) 5
current measurement (5) 5
data mining (5) 5
education (5) 5
ethics (5) 5
insulated gate bipolar transistors (5) 5
jewelry (5) 5
joints (5) 5
prospective studies (5) 5
state elections (5) 5
transmission of digital information, e.g. telegraphiccommunication (5) 5
usage (5) 5
voltage measurement (5) 5
abridged index medicus (4) 4
advertising (4) 4
anonymity (4) 4
arrangements or circuits for control of indicating devicesusing static means to present variable information (4) 4
article (4) 4
bandwidth (4) 4
basic electronic circuitry (4) 4
biochemistry & molecular biology (4) 4
computer science - computers and society (4) 4
computer science, information systems (4) 4
computer security (4) 4
density evolution (4) 4
display (4) 4
economics (4) 4
genomics (4) 4
iterative decoding (4) 4
joint decoding (4) 4
ldpc codes (4) 4
machine learning (4) 4
medicine & public health (4) 4
mice (4) 4
mortality (4) 4
multidisciplinary sciences (4) 4
neoplasm staging (4) 4
original (4) 4
physiological aspects (4) 4
political parties (4) 4
prime ministers (4) 4
reduction (4) 4
seals (4) 4
switching energy loss (4) 4
temperature measurement (4) 4
transmission (4) 4
wireless communications networks (4) 4
access control (3) 3
adolescent (3) 3
ammonia (3) 3
area theorem (3) 3
biology (3) 3
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Proceedings of the ACM Conference on Computer and Communications Security, ISSN 1543-7221, 10/2016, Volume 24-28-, pp. 1388 - 1401
Conference Proceeding
Science, ISSN 0036-8075, 04/2017, Volume 356, Issue 6334, pp. 183 - 186
Machine learning is a means to derive artificial intelligence by discovering patterns in existing data. Here, we show that applying machine learning to... 
STEREOTYPES | MULTIDISCIPLINARY SCIENCES | ATTITUDES | IMPLICIT | Names | Association | Language | Semantics | Humans | Sex Factors | Female | Male | Internet | Machine Learning | Technology application | Usage | Machine learning | Computational biology | Ethics | Learning algorithms | World Wide Web | Mathematical models | Artificial intelligence | Index Medicus | Insects | Texts | Flowers | Professional development | Culture
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 05/2013, Volume 11, Issue 3, p. 68
  Despite privacy-preserving cryptography technologies' potential, they've largely failed to find commercial adoption. Reasons include people's unawareness of... 
Journal Article
Nature Reviews Genetics, ISSN 1471-0056, 08/2014, Volume 15, Issue 8, pp. 570 - 570
Journal Article
Nature Reviews Genetics, ISSN 1471-0056, 2014, Volume 15, Issue 8, p. 570
Journal Article
Proceedings of the 12th ACM conference on computer and communications security, ISSN 1543-7221, 11/2005, pp. 364 - 372
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to brute-force dictionary attacks, many organizations... 
dictionary attack | cryptanalysis | Markov models | passwords | tradeoff | time-space | Cryptanalysis | Time-Space Tradeoff | Dictionary Attack | Markov Models | Passwords
Conference Proceeding
The International Journal of Advanced Manufacturing Technology, ISSN 0268-3768, 07/2019, pp. 1 - 21
In the present work, end forming of friction stir processed (FSPed) Al 6063T6 tubes at varying traverse speeds has been studied. End expansion, reduction, and... 
Density measurement | Beading | Mechanical properties | Mapping | Optimization | Finite element method | Dislocation density | Reduction | Mathematical analysis | Tubes | Energy absorption | Tensile properties | Strain hardening
Journal Article
2015 IEEE Symposium on Security and Privacy, ISSN 1081-6011, 05/2015, Volume 2015-, pp. 104 - 121
Bit coin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bit coin grew to comprise billions... 
Protocols | Online banking | Peer-to-peer computing | Cryptography | Proposals | Communities | Design engineering | Coins | Launches | Source code | Mediation | Currencies | Computer programs
Conference Proceeding
IEEE Security & Privacy, ISSN 1540-7993, 03/2013, Volume 11, Issue 2, pp. 75 - 76
One way to use cryptography for privacy is to tweak various systems to be privacy-preserving. But the more radical cypherpunk movement sought to wield crypto... 
Privacy | security | cypherpunk | Social factors | Cryptography | Social implications of technology | Computer security | Computer crime | crypto | cryptography | privacy | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 05/2013, Volume 11, Issue 3, pp. 68 - 71
Despite privacy-preserving cryptography technologies' potential, they've largely failed to find commercial adoption. Reasons include people's unawareness of... 
Performance evaluation | Data privacy | Software deveopment | security | privacy | Marketing and sales | Cryptography | Computer security | Commercialization | crypto | cryptography | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
World Wide Web, ISSN 1386-145X, 07/2019, pp. 1 - 28
We coin the term geoMobile data to emphasize datasets that exhibit geo-spatial features reflective of human behaviors. We propose and develop an EPIC framework... 
Datasets | Data mining | Clustering | Human behavior | Data sets
Journal Article
Journal of Constructional Steel Research, ISSN 0143-974X, 05/2018, Volume 144, pp. 186 - 197
In the present work, a detailed analysis of pull-out tests of Mild Steel tube-Stainless sheet joint fabricated by tube endforming has been done. The same has... 
Deformation | Joint testing | Endforming | Simulation | Pull-out | Steel, Stainless | Mechanical engineering | Analysis
Journal Article
Businessline, 01/2017
Newspaper Article
Journal of Materials Processing Tech, ISSN 0924-0136, 08/2017, Volume 246, pp. 291 - 304
Journal Article
NATURE REVIEWS GENETICS, ISSN 1471-0056, 08/2014, Volume 15, Issue 8, p. 570
Journal Article
PLoS Computational Biology, ISSN 1553-734X, 03/2017, Volume 13, Issue 3, pp. e1005399 - e1005399
About the Authors: Matthew Zook * E-mail: zook@uky.edu Affiliation: Department of Geography, University of Kentucky, Lexington, Kentucky, United States of... 
BIOCHEMICAL RESEARCH METHODS | MATHEMATICAL & COMPUTATIONAL BIOLOGY | Guidelines as Topic | Societies, Scientific - organization & administration | Financial Management | Computational Biology | Social networks | Big data | Research | Technology application | Usage | Methodology | Privacy | Ethics | Research methodology | Index Medicus
Journal Article
Journal Article
Proceedings of the 2014 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 11/2014, pp. 674 - 689
We present the first large-scale studies of three advanced web tracking mechanisms - canvas fingerprinting, evercookies and use of "cookie syncing" in... 
web security | cookie syncing | browser fingerprinting | canvas fingerprinting | privacy | evercookie, javascript | tracking | flash | Evercookie | Privacy | Tracking | Canvas fingerprinting | Java-Script | Cookie syncing | Web security | Flash | Browser fingerprinting
Conference Proceeding
Journal Article
2009 30th IEEE Symposium on Security and Privacy, ISSN 1081-6011, 05/2009, pp. 173 - 187
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers,... 
Privacy | Data privacy | Peer to peer computing | social networks | Companies | anonymity | Facebook
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.