Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 13.191
41.
  • Improvement of Tsunami Coun... Improvement of Tsunami Countermeasures Based on Lessons from The 2011 Great East Japan Earthquake and Tsunami - Situation After Five Years
    Suppasri, Anawat; Latcharote, Panon; Bricker, Jeremy D. ... Coastal Engineering Journal, 12/1/2016, 20161200, 2016-12-00, 20161201, Letnik: 58, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The 2011 Great East Japan Tsunami exposed many hidden weaknesses in Japan's tsunami countermeasures. Since then, many improvements have been made in both structural measures (numerical simulations, ...
Celotno besedilo
Dostopno za: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK

PDF
42.
  • Efficient invisible specula... Efficient invisible speculative execution through selective delay and value prediction
    Sakalis, Christos; Kaxiras, Stefanos; Ros, Alberto ... 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA), 06/2019
    Conference Proceeding
    Odprti dostop

    Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, has recently been shown to enable a slew of security attacks. All these attacks are centered around ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
43.
  • Adaptive Radar Detection an... Adaptive Radar Detection and Classification Algorithms for Multiple Coherent Signals
    Han, Sudan; Yan, Linjie; Zhang, Yuxuan ... IEEE transactions on signal processing, 2021, Letnik: 69
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we address the problem of target detection in the presence of coherent (or fully correlated) signals, which can be due to multipath propagation effects or electronic attacks by smart ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
44.
  • Strategies for Enhancing th... Strategies for Enhancing the Impact of Blended Instruction in Chinese Colleges and Universities
    Song, Qianqian; Agnawa Jr, Marcelino M. International journal of information and education technology, 08/2023, Letnik: 13, Številka: 8
    Journal Article

    Due to the rapid development of information technology, traditional classroom teaching is not able to meet the needs of students. Therefore, colleges and universities are paying more and more ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
45.
  • The disconcerting potential... The disconcerting potential of online disinformation: Persuasive effects of astroturfing comments and three strategies for inoculation against them
    Zerback, Thomas; Töpfl, Florian; Knöpfle, Maria New media & society, 05/2021, Letnik: 23, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    This study is the first to scrutinize the psychological effects of online astroturfing in the context of Russia’s digitally enabled foreign propaganda. Online astroturfing is a communicative strategy ...
Celotno besedilo
Dostopno za: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK

PDF
46.
  • InSpectre: Breaking and Fix... InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
    Guanciale, Roberto; Balliu, Musard; Dam, Mads Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 10/2020
    Conference Proceeding
    Odprti dostop

    The recent Spectre attacks have demonstrated the fundamental insecurity of current computer microarchitecture. The attacks use features like pipelining, out-of-order and speculation to extract ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
47.
  • Rule discovery to identify ... Rule discovery to identify patterns contributing to overrepresentation and severity of run-off-the-road crashes
    Montella, Alfonso; Mauriello, Filomena; Pernetti, Mariano ... Accident analysis and prevention, 06/2021, Letnik: 155
    Journal Article
    Recenzirano

    •Roadway, environmental, and driver factors associated with ROR crashes were investigated.•The analysis was carried out using the rule discovery technique.•Data refer to the crashes occurred in the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
48.
  • Countermeasures for Improvi... Countermeasures for Improving Online Teaching Effect in Chinese Colleges and Universities during the Epidemic Period
    Liu, Changyu; Patnao, Jr, James L. International journal of information and education technology, 05/2023, Letnik: 13, Številka: 5
    Journal Article
    Odprti dostop

    During the epidemic period, colleges and universities in China have launched online teaching practices. Online teaching can break through geographical restrictions, with flexible class times and ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
49.
  • Containing the Not-Invented... Containing the Not-Invented-Here Syndrome in external knowledge absorption and open innovation: The role of indirect countermeasures
    Hannen, Julian; Antons, David; Piller, Frank ... Research policy, November 2019, 2019-11-00, Letnik: 48, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    •We develop a novel process perspective on NIHS based on the 4i framework of organizational learning.•We present a typology of NIHS countermeasures and explore their use in R&D practice.•We direct ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
50.
  • Time pressure in human cybe... Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures
    Chowdhury, Noman H; Adam, Marc TP; Teubner, Timm Computers & security, 10/2020, Letnik: 97
    Journal Article
    Recenzirano

    Cybersecurity is a growing concern for private individuals and professional entities. Reports have shown that the majority of cybersecurity incidents occur because users fail to behave securely. ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3 4 5 6 7
zadetkov: 13.191

Nalaganje filtrov