Results 251 to 260 of about 756,194 (303)
Correction to: Long telomere inheritance through budding yeast sexual cycles. [PDF]
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the Sixth International Conference on Emerging Databases: Technologies, Applications, and Theory, 2016
Address Cleansing is a very challenging problem, in particular, for geographies where there is a lot of variability in address nomenclature. This paper explains how a machine learning classifier is used to build a model that not only identifies a valid address, but also assigns a confidence score to it.
openaire +1 more source
Address Cleansing is a very challenging problem, in particular, for geographies where there is a lot of variability in address nomenclature. This paper explains how a machine learning classifier is used to build a model that not only identifies a valid address, but also assigns a confidence score to it.
openaire +1 more source
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015
We introduce UniAuth, a set of mechanisms for streamlining authentication to devices and web services. With UniAuth, a user first authenticates himself to his UniAuth client, typically his smartphone or wearable device. His client can then authenticate to other services on his behalf.
Eiji Hayashi, Jason I. Hong
openaire +1 more source
We introduce UniAuth, a set of mechanisms for streamlining authentication to devices and web services. With UniAuth, a user first authenticates himself to his UniAuth client, typically his smartphone or wearable device. His client can then authenticate to other services on his behalf.
Eiji Hayashi, Jason I. Hong
openaire +1 more source
2021
Thus far in the book, we’ve discovered how to write code for Arduino and Python (on the Raspberry Pi) for projects that use the Qwiic and STEMMA/QT modules. Recall the simple wiring mechanism to connect those modules to your host board.
openaire +1 more source
Thus far in the book, we’ve discovered how to write code for Arduino and Python (on the Raspberry Pi) for projects that use the Qwiic and STEMMA/QT modules. Recall the simple wiring mechanism to connect those modules to your host board.
openaire +1 more source
Proceedings of the Eleventh International Conference on Tangible, Embedded, and Embodied Interaction, 2017
When a person gets to a door and wants to get in, what do they do? They knock. In our system, the user's specific knock pattern authenticates their identity, and opens the door for them. The system empowers people's intuitive actions and responses to affect the world around them in a new way.
Marisa Lu +3 more
openaire +1 more source
When a person gets to a door and wants to get in, what do they do? They knock. In our system, the user's specific knock pattern authenticates their identity, and opens the door for them. The system empowers people's intuitive actions and responses to affect the world around them in a new way.
Marisa Lu +3 more
openaire +1 more source
English Today, 2008
ABSTRACTA foray into an oddity of word-making. Outside the province of jokelore, this type of abbreviation appears to have escaped notice in the literature on word-formation, perhaps because its productivity, besides being quite low, can best be seen in the most informal – and therefore supposedly ‘abnormal’ and ‘disreputable’ – levels of discourse. Of
openaire +1 more source
ABSTRACTA foray into an oddity of word-making. Outside the province of jokelore, this type of abbreviation appears to have escaped notice in the literature on word-formation, perhaps because its productivity, besides being quite low, can best be seen in the most informal – and therefore supposedly ‘abnormal’ and ‘disreputable’ – levels of discourse. Of
openaire +1 more source

