Results 201 to 210 of about 82,437 (264)
Some of the next articles are maybe not open access.

Molecular detection of blood-borne agents in vampire bats from Brazil, with the first molecular evidence of Neorickettsia sp. in Desmodus rotundus and Diphylla ecaudata.

Acta Tropica, 2023
Bats (Mammalia, Chiroptera) represent the second largest group of mammals. Due to their ability to fly and adapt and colonize different niches, bats act as reservoirs of several potentially zoonotic pathogens.
Victória Valente Califre de Mello   +9 more
semanticscholar   +1 more source

The evolution of sanguivory in vampire bats: origins and convergences

Canadian Journal of Zoology, 2023
Blood-feeding (sanguivory) has evolved more than two dozen times among birds, fishes, insects, arachnids, molluscs, crustaceans, and annelids; however, among mammals, it is restricted to the vampire bats.
D. Riskin, G. Carter
semanticscholar   +1 more source

Coverage Enhancement Algorithm for WSNs Based on Vampire Bat and Improved Virtual Force

IEEE Sensors Journal, 2022
Coverage enhancement is an important strategy to avoid coverage holes caused by the random deployment of sensor nodes. Given the harsh physical environments of wireless sensor networks (WSNs), which impede the energy supplement and recovery of sensor ...
Qin Wen   +5 more
semanticscholar   +1 more source

Vampire With a Brain Is a Good ITP Hammer

International Symposium on Frontiers of Combining Systems, 2021
. Vampire has been for a long time the strongest first-order automatic theorem prover, widely used for hammer-style proof automation in ITPs such as Mizar, Isabelle, HOL, and Coq.
M. Suda
semanticscholar   +1 more source

Energy-Efficient Coverage Enhancement Strategy for 3-D Wireless Sensor Networks Based on a Vampire Bat Optimizer

IEEE Internet of Things Journal, 2020
As one of the crucial scenarios of the Internet of Things, wireless sensor networks (WSNs) perform tasks invariably on the basis of the effective cover effect of targets.
Xiaoqiang Zhao   +4 more
semanticscholar   +1 more source

Vampiric Textuality:

2022
This chapter points out that certain modernist texts are characterized by what could be called cryptopoiesis: texts endowed with embedded forms not easily observable on a first reading nor even a close second reading. It argues that Joyce’s use of cryptopoiesis in Ulysses elicits a patently posthumanist mode of observation.
openaire   +1 more source

The Vampire Diary

International Conference on Computer Aided Verification
During the past decade of continuous development, the theorem prover Vampire has become an automated solver for the combined theories of commonly-used data structures. Vampire now supports arithmetic, induction, and higher-order logic.
Filip B'artek   +12 more
semanticscholar   +1 more source

An anomalous co‐operative trust & PG‐DRL based vampire attack detection & routing

Concurrency and Computation, 2021
Sensor nodes in WSN play a vital role in communication, IoTs and many other emergencies too. However, the energy consumption of nodes is a major setback to these, which incites various malicious nodes/attacks.
Vikas Juneja   +2 more
semanticscholar   +1 more source

Vampires

2006
Introduction Part I: Legend of the Vampire: Elizabeth MILLER: Getting to know the Undead: Bram Stoker, Vampires and Dracula Hyun-Jung LEE: "One for Ever": Desire, Subjectivity and the Threat of the Abject in Sheridan Le Fanu's Carmilla Lois DRAWMER: Sex, Death and Ecstacy: The Art of Transgression Peter Mario KREUTER: The Name of the Vampire.
openaire   +1 more source

Home - About - Disclaimer - Privacy