نتایج جستجو برای: classified

تعداد نتایج: 110297  

Journal: :The Bulletin of the National Tax Association 1920

Journal: :The Biochemical journal 1964
S Sano N Nanzyo C Rimington

Green, D. E. & Gibson, D. M. (1960). In Metabolic Pathways, vol. 1, p. 330. Ed. by Greenberg, D. M. New York: Academic Press Inc. Lieber, C. S. & Davidson, C. S. (1962). Amer. J. Med. 33, 319. Lieber, C. S. & Schmid, R. (1961). J. clin. Invest. 40, 394. Mallov, S. & Bloch, J. L. (1956). Amer. J. Phy8iol. 184, 29, Nyberg, A., Schuberth, J. & Auggird, L. (1953). Acta chem. 8cand. 7, 1170. RebouQa...

2004
Mohamed Babaali

ACKNOWLEDGEMENTS I wish to express my sincere appreciation to my thesis advisor, Professor Magnus Egerstedt, for his guidance, patience, and support. I am also specially grateful to Professor Edward W. Kamen for his support and encouragement early on in my PhD studies, as my first advisor. I also wish to thank Professors Erik I. Verriest and Yorai Wardi for serving on my reading committee, and ...

Journal: :Pediatrics 2016

Copyright © 2016 by the American Academy of Pediatrics In April 2016, the American Academy of Pediatrics endorsed the following publication: Paruthi S, Brooks LJ, D’Ambrosio C, et al. Recommended amount of sleep for pediatric populations: a consensus statement of the American Academy of Sleep Medicine. J Clin Sleep Med. 2016;12(6):785–786. Available at: http:// www. aasmnet. org/ Resources/ pdf...

2005
Anthony Whitehead

There have been a number of steganography embedding techniques proposed over the past few years. In turn, there has been great interest in steganalysis techniques as the embedding techniques improve. Specifically, universal steganalysis techniques have become more attractive since they work independently of the embedding technique. In this work, we examine the effectiveness of a basic universal...

2006
Ahmed HajYasien Vladimir Estivill-Castro

Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these algorithms are based on item-restriction methods; that is, removing items from some transactions in order to hide sensitive frequent itemsets. The infancy of this area has not produced clear methods neither evaluated ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید