Results 151 to 160 of about 26,866 (284)
Graph-augmented multi-modal learning framework for robust android malware detection. [PDF]
Tanveer MU +5 more
europepmc +1 more source
Abstract Acoustic cameras, or imaging sonars, are often used to monitor marine energy sites in regions where the water is too dark or turbid for optical sensing. To do so more effectively, scientists are investigating automated detection methodologies to use on these data.
Theodore Nowak +2 more
wiley +1 more source
On the moral (in)equivalence of human embryos and stem cell-derived embryo models. [PDF]
de Graeff N, De Proost L.
europepmc +1 more source
Photo‐Excitations in Halide Perovskites: Where Do Simulations and Experiments Meet?
Aiming to bridge the gap between simulations and measurements of light–matter couplings and photo‐excitations in new functional materials, this perspective highlights insights and bottlenecks of state‐of‐the‐art experimental and theoretical methods (2D electronic spectroscopy vs.
Muhammad Sufyan Ramzan +5 more
wiley +1 more source
JDroid: Android malware detection using hybrid opcode feature vector. [PDF]
Arslan RS.
europepmc +1 more source
Contesting Regulatory Capacity: Exploring Doctrines in the Regulatory State
ABSTRACT The contemporary literature on regulation and development has emphasised the importance of low discretion devices for achieving desired policy objectives. At the same time, there has been a growing recognition that state capacity in general, and regulatory capacity more specifically, are essential for achieving development goals in a world of ...
Bruno Queiroz Cunha, Martin Lodge
wiley +1 more source
Semantic code clone detection using hybrid intermediate representations and BiLSTM networks. [PDF]
Shahbaz Ismail M, Shahzad S, Quradaa FH.
europepmc +1 more source
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien +2 more
wiley +1 more source
Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking. [PDF]
Li X, Lee J, Son J, Lee Y.
europepmc +1 more source
ABSTRACT The lack of a common variable for comparison has been a major obstacle to the development of Comparative Public Administration (CPA). State autonomy enables an integrative contextualization approach, allowing both the analysis of contextual individual country experiences and the generation of generalized comparable knowledge.
Wilson Wong
wiley +1 more source

