Results 241 to 250 of about 6,857,309 (337)
Malware classification through Abstract Syntax Trees and L-moments
Anthony J. Rose+4 more
openalex +1 more source
We studied oviposition site selection in a leaf‐mining moth (Stigmella sorbi) on rowan trees (Sorbus aucuparia) in northwestern Russia, assessing larval performance across different shoot types, leaf positions, and leaflets. Larval survival was highest on long vegetative shoots, yet females showed no preference for these optimal sites.
Mikhail V. Kozlov, Vitali Zverev
wiley +1 more source
DIMScern: A Framework for Discerning DIMSE Services on Remote Medical Devices. [PDF]
Kim G, Kim D, Seo J, Lee S, Song W.
europepmc +1 more source
Multi-level Meta-reasoning with Higher-Order Abstract Syntax
Alberto Momigliano, Simon Ambler
openalex +1 more source
Outcomes of Fecal Diversion in Perianal Crohn's Disease: A Systematic Review and Meta‐Analysis
Fecal diversion provides symptom control in patients with perianal fistulising Crohn’s disease, with a 65% clinical improvement rate. However, bowel restoration is achieved in only 29% of cases, and many require re‐diversion or proctectomy/protocolectomy.
Imogen Hartley+4 more
wiley +1 more source
Plug and Play the Theory of Contexts in Higher-Order Abstract Syntax
Alberto Ciaffaglione, Ivan Scagnetto
openalex +1 more source
Left and Right as a Narrative of the Global
ABSTRACT The left–right narrative is the most universal macro‐story to make sense of global politics. Although the political opposition between the left and the right originated in the West, it has now spread to all continents. Nation‐states remain the primary locus of the politics of left and right, but the distinction has become a global divide that ...
Alain Noël, Jean‐Philippe Thérien
wiley +1 more source
The COVID-19 Pandemic and the Role of Tele-Nursing in Reducing Bed Occupancy: A Systematic Review. [PDF]
Sheikhi RA+3 more
europepmc +1 more source
Cybersecurity Risks and Incidents Disclosure: A Literature Review*
ABSTRACT This paper reviews the expanding literature on the disclosure of cybersecurity risks and incidents. In contrast to prior reviews on cybersecurity, we focus specifically on disclosure and consider studies publicly available to the end of 2024. We classify the literature along three main dimensions: characteristics, determinants, and outcomes of
Farzaneh Amani+2 more
wiley +1 more source