Cyber security Enhancements with reinforcement learning: A zero-day vulnerabilityu identification perspective. [PDF]
Naeem MR +5 more
europepmc +1 more source
Epithelial Cdc42 Deletion Induced Enamel Organ Defects and Cystogenesis. [PDF]
Zheng J +11 more
europepmc +1 more source
Achieving handle-level random access in an encrypted DNA archival storage system via frequency dictionary mapping coding. [PDF]
Cao B +6 more
europepmc +1 more source
A layered searchable encryption scheme with functional components independent of encryption methods. [PDF]
Luo G, Peng N, Qin K, Chen A.
europepmc +1 more source
Anti-Inflammatory and Antiplatelet Interactions on PAF and ADP Pathways of NSAIDs, Analgesic and Antihypertensive Drugs for Cardioprotection-In Vitro Assessment in Human Platelets. [PDF]
Katsanopoulou M +6 more
europepmc +1 more source
Related searches:
Personale Kundenorientierungsskala (PeKS)
2021Die Kundenorientierung von Servicemitarbeiterinnen und -mitarbeitern gilt als zentral für die Kundenzu-friedenheit (Dormann et al., 2003; Dormann & Zapf, 2007). Kundenorientierung wird definiert als Be-reitschaft und Bemühung, Erwartungen und Anforderungen von Kunden zu verstehen und zu erfüllen (Dormann et al., 2003; Nerdinger, 2003).
openaire +1 more source
The sequential Prolog machine PEK currently under development is described. PEK is an experimental machine designed for high speed execution of Prolog programs. The PEK machine is controlled by horizontal-type microinstructions. The machine includes bit slice microprocessor elements comprising a microprogram sequencer and ALU, and possesses hardware ...
Yukio Kaneda +5 more
openaire +1 more source
Nyctycia utilis Hacker & Peks 1993
Published as part of Joshi, Rahul, Raha, Angshuman, Bandyopadhyay, Uttaran, Bhattacharyya, Kamalika & Singh, Navneet, 2025, A catalogue of Noctuidae Latreille, 1809 (Lepidoptera: Noctuoidea) from India, pp.Joshi, Rahul +4 more
+7 more sources
Political Efficacy Kurzskala (PEKS)
2014Die PEKS ist ein ökonomisches Instrument zur Erfassung politischer Kompetenz- und Einflusserwartungen im politischen Bereich. Die Validierungsuntersuchungen haben gezeigt, dass die PEKS eine reliable und valide Messung der internen und externen politischen Kompetenz- und Einflusserwartungen erlaubt.
Beierlein, C. +3 more
openaire +1 more source
A flaw in the security proof of BDOP-PEKS and PEKS-STAT
Wuhan University Journal of Natural Sciences, 2007Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP ...
Yajuan Zhang +3 more
openaire +1 more source

