Results 61 to 70 of about 1,105 (119)
Efficient Keyset Design for Neural Networks Using Homomorphic Encryption. [PDF]
Joo Y, Ha S, Oh H, Paek Y.
europepmc +1 more source
Efficient face information encryption and verification scheme based on full homomorphic encryption. [PDF]
Chen Y +7 more
europepmc +1 more source
Evaluating the Adoption of mHealth Technologies by Community Health Workers to Improve the Use of Maternal Health Services in Sub-Saharan Africa: Systematic Review. [PDF]
Kachimanga C +8 more
europepmc +1 more source
Thermodynamic Models from Fluctuation Solution Theory Analysis of Molecular Simulations [PDF]
Christensen, Steen
core
An examination of William Notcutt\u27s reply to H.B\u27s vindication of R. Barclay\u27s apology
Wherein the deceit of the said W.N. is father manifested; his many abuses of the people call\u27d Quakers detected; and the genuine sense of their writers asserted; against his gross and palpable perversions of them.https://digitalcommons.georgefox.edu ...
Brown, Henton
core

