Suggested Topics within your search.
Suggested Topics within your search.
- Surveying 5
- Research 3
- Building sites 2
- Evaluation research (Social action programs) 2
- Methodology 2
- Archaelogy 1
- Balanced Scorecard 1
- Bildanalyse 1
- Bildwissenschaft 1
- Classification 1
- Communicative Disorders 1
- Communicative disorders 1
- Demographic surveys 1
- Diversity in the workplace 1
- Education 1
- Evaluation 1
- Evidence-based social work 1
- Forest surveys 1
- Forests and forestry 1
- Geography 1
- Handlungsorientierung 1
- Health Survey 1
- Health surveys 1
- Jurisprudence 1
- LAW / Jurisprudence 1
- Law 1
- Medical History Taking 1
- Moral and ethical aspects 1
- Nursing Assessment 1
- Nursing assessment 1
-
101
-
102
Promoting the digital transformation of the South African quantity surveying profession through the implementation of change management theories
Published 2023-12-01Subjects: Get full text
Article -
103
COSMIC’s Large-scale Search for Technosignatures during the VLA Sky Survey: Survey Description and First Results
Published 2025-01-01“…This paper presents the strategy we employ when commensally observing during the VLA Sky Survey and a postprocessing strategy for the data collected during the survey. …”
Get full text
Article -
104
Assessing survey design changes of long-term fishery-independent groundfish trawl surveys in the Gulf of Mexico
Published 2025-02-01Subjects: Get full text
Article -
105
Uganda Demographic and Health Survey 2006 /
Published 2006Subjects: “…Health surveys Uganda. 9000…”
View in OPAC
Book -
106
Survey of virtual network embedding problem
Published 2011-01-01“…Related research work of virtual networks(VN) embedding was surveyed,and both of the advantages and dis-advantages in the key technologies of related research work were analyzed.The possible future research directions were also discussed as references for the research of VN embedding problem.…”
Get full text
Article -
107
The Savvy Survey #7: Formatting Questionnaires
Published 2016-02-01Subjects: “…Savvy Survey Series…”
Get full text
Article -
108
Survey of Bitcoin de-anonymization technology
Published 2024-11-01“…Consequently, de-anonymization techniques have been actively researched, yielding a series of research results. Existing surveys primarily focus on privacy protection schemes, lacking a systematic analysis of de-anonymization techniques. …”
Get full text
Article -
109
-
110
-
111
Anonymous survey system based on NIZK
Published 2016-12-01Subjects: “…anonymous electronic survey…”
Get full text
Article -
112
-
113
A survey of neural architecture search
Published 2019-05-01“…Recently,deep learning has achieved impressive success on various computer vision tasks.The neural architecture is usually a key factor which directly determines the performance of the deep learning algorithm.The automated neural architecture search methods have attracted more and more attentions in recent years.The neural architecture search is the automated process of seeking the optimal neural architecture for specific tasks.Currently,the neural architecture search methods have shown great potential in exploring high-performance and high-efficiency neural architectures.In this paper,a survey in this research field and categorize existing methods based on their performance estimation methods,search spaces and architecture search strategies were presented.Specifically,there were four performance estimation methods for computation cost reduction,two typical neural architecture search spaces and two types of search strategies based on discrete and continuous spaces respectively.Neural architecture search methods based on continuous space are becoming the trend of researches on neural architecture search.…”
Get full text
Article -
114
-
115
-
116
The Savvy Survey #4: Details in the Design
Published 2013-12-01“… As part of the Savvy Survey Series, this publication provides an overview of important facets of the survey process. …”
Get full text
Article -
117
-
118
-
119
Survey of DDoS defense:challenges and directions
Published 2017-10-01“…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
Get full text
Article -
120