Showing 2,561 - 2,580 results of 81,006 for search 'at*', query time: 0.15s Refine Results
  1. 2561
  2. 2562

    Influence of Attribute Granulation on Three-Way Concept Lattices by Jun Long, Yinan Li, Zhan Yang

    Published 2024-09-01
    Subjects: “…granularity of attributes…”
    Get full text
    Article
  3. 2563
  4. 2564

    History of the Second World War: Countering Attempts to Falsify and Distort to the Detriment of International Security by V. G. Kiknadze

    Published 2015-08-01
    “…The main internal risks attributable activity information impact on the population, especially young citizens of the country, which has the aim of undermining the historical, spiritual and patriotic traditions in the field of defense of the Fatherland.…”
    Get full text
    Article
  5. 2565
  6. 2566

    Attribution Theory: How is it Used? by Eric D. Rubenstein, Andrew C. Thoron

    Published 2014-09-01
    “… Attribution theory is defined as the way that individuals envision the success or failure of their own behavior or the behavior of others. …”
    Get full text
    Article
  7. 2567

    Role of Reactive Oxygen Species in the Progression of Type 2 Diabetes and Atherosclerosis by Hideaki Kaneto, Naoto Katakami, Munehide Matsuhisa, Taka-aki Matsuoka

    Published 2010-01-01
    “…Taken together, it is likely that ROS play an important role in the development of type 2 diabetes and atherosclerosis.…”
    Get full text
    Article
  8. 2568

    Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm by Demei Mao, Mingzhu Wang

    Published 2025-12-01
    “…Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. …”
    Get full text
    Article
  9. 2569
  10. 2570
  11. 2571

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    Subjects: “…low-rate denial of service attack…”
    Get full text
    Article
  12. 2572

    Use of D-Squame<sup>®</sup> as a Minimally Invasive Technique to Evaluate Skin Immune Response Biomarkers in Canine Atopic Dermatitis by Marion Mosca, Nadège Milhau, Mélanie Legain, Adrien Idée, Xavier Langon, Didier Pin

    Published 2024-12-01
    “…Evaluation of skin inflammation biomarkers in canine atopic dermatitis (AD) currently requires skin biopsies. …”
    Get full text
    Article
  13. 2573

    Chover-Type Laws of the Iterated Logarithm for Kesten-Spitzer Random Walks in Random Sceneries Belonging to the Domain of Stable Attraction by Wensheng Wang, Anwei Zhu

    Published 2018-01-01
    “…It is assumed that σ’s belong to the domain of attraction of a stable law with index 0<β<2. In this paper, by employing conditional argument, we investigate large deviation inequalities, some sufficient conditions for Chover-type laws of the iterated logarithm and the cluster set for random walk in random scenery Kn. …”
    Get full text
    Article
  14. 2574
  15. 2575
  16. 2576

    Sustained Auditory Attentional Load Decreases Audiovisual Integration in Older and Younger Adults by Yanna Ren, Yawei Hou, Jiayu Huang, Fanghong Li, Tao Wang, Yanling Ren, Weiping Yang

    Published 2021-01-01
    “…The modulation of attentional load on the perception of auditory and visual information has been widely reported; however, whether attentional load alters audiovisual integration (AVI) has seldom been investigated. …”
    Get full text
    Article
  17. 2577
  18. 2578
  19. 2579

    ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments by Rodrigo Asensio-Garriga, Pol Alemany, Alejandro M. Zarca, Roshan Sedar, Charalampos Kalalas, Jordi Ortiz, Ricard Vilalta, Raul Munoz, Antonio Skarmeta

    Published 2024-01-01
    “…Research on vehicle-to-everything (V2X) is attracting significant attention nowadays, driven by the recent advances in beyond-5G (B5G) networks and the multi-access edge computing (MEC) paradigm. …”
    Get full text
    Article
  20. 2580