String

Results: 6065



#Item
511

Extraordinary String Based Attacks About Me Security Researcher at Azimuth Security  Past presentations 

Add to Reading List

Source URL: www.mista.nu

Language: English - Date: 2016-01-01 16:55:26
    512Systems biology / Biological databases / KEGG / Modularity / Bioinformatics / Module / Metabolism / STRING / Homology / Metabolic network

    Genome Informatics 13: 353–Extraction of Modules from the Metabolic Pathways with Phylogenetic Profile

    Add to Reading List

    Source URL: www.jsbi.org

    Language: English - Date: 2002-12-19 23:03:36
    513

    American String Association / Greater Los Angeles Section LA Final Competition Results Date: ___May 24, 2014_____ Chairperson: __Gloria Traullé____ Location: California State University of Fullerton, Recital Hall First

    Add to Reading List

    Source URL: www.revisemysite.com

    Language: English - Date: 2014-06-15 12:36:26
      514Spam filtering / Spamming / Computing / Cyberspace / Email / Cybercrime / Email spam / Anti-spam techniques / Spam / Naive Bayes spam filtering

      Data Compression Models for Prediction and Classification Gordon CORMACK1 University of Waterloo, Waterloo, Canada Abstract. The crux of data compression is to process a string of bits in order, predicting each subsequen

      Add to Reading List

      Source URL: plg.uwaterloo.ca

      Language: English - Date: 2007-12-14 09:36:19
      515

      SUSY 2015 Lake Tahoe, Aug. 28 • Virtually all non-supersymmetric string vacua (including de Sitter vacua) are ultimately unstable. • We live with metastability all the time (ordinary

      Add to Reading List

      Source URL: indico.cern.ch

      Language: English - Date: 2015-08-27 00:41:38
        516

        T-String-Unification: Unifying Prefixes in Non-Classical Proof Methods Jens Otten? Christoph Kreitz

        Add to Reading List

        Source URL: www.jens-otten.de

        Language: English - Date: 2012-03-30 11:05:53
          517Computing / Software engineering / Cross-platform software / Java platform / Computing platforms / Sun Microsystems / Java virtual machine / Data types / Java / Computer program / Infinite loop / String

          The Illusion Of Execution Nitsan Wakart (@nitsanw) Lead Performance Engineer, Azul Systems http://psy-lob-saw.blogspot.com

          Add to Reading List

          Source URL: 2014.jokerconf.com

          Language: English - Date: 2015-02-28 17:19:50
          518

          Hong Kong String Orchestra Hong Kong String Orchestra is the first ever professional string ensemble in Hong Kong with international mentorship programme. It is a charity organization established with the missions to sup

          Add to Reading List

          Source URL: www.hkaaa.org.hk

          Language: English - Date: 2015-11-26 22:52:09
            519String theory / Physics / Theoretical physics / Particle physics / Brane / D-brane / Conformal field theory / K-theory / Superstring theory / Bosonic string theory / Topological quantum field theory / Vertex operator algebra

            CLOSED AND OPEN CONFORMAL FIELD THEORIES AND THEIR ANOMALIES PO HU AND IGOR KRIZ Abstract. We describe a formalism allowing a completely mathematical rigorous approach to closed and open conformal field theories with gen

            Add to Reading List

            Source URL: www.math.lsa.umich.edu

            Language: English - Date: 2004-04-21 08:42:12
            520

            String Figure Bibliography of Australian Aboriginal and Torres Strait Islander Peoples Ken Edwards

            Add to Reading List

            Source URL: www.isfa.org

            Language: English - Date: 2012-04-14 18:14:18
              UPDATE