„Bar coding“
Suchergebnisse
526 Treffer
-
,,Basispaket Cybersicherheit‘‘ – Oder wie Standardisierung, Vergleichbarkeit und Transparenz im Cybersicherheitsmarkt für mehr Resilienz sorgen können
-
An evolutionary continuum between non-coding and coding DNA
-
Coding Theory and Applications – 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings
-
Identification of functional non-coding variants associated with orofacial cleft
-
RFID for the Optimization of Business Processes
-
Integrative analysis of coding and non-coding RNAs in rice reveals conserved molecular response signatures to heat, drought, and salt stresses
-
Breaking barriers in ICD classification with a robust graph neural network for hierarchical coding
-
Nicht kodierende Ribonukleinsäure im kardiovaskulären System – Sonderforschungsbereich-Transregio (SFB-TRR 267)
-
A proof of a conjecture on permutation trinomials
-
Coding and non-coding RNA expression in NSC34 cells following TDP-43 depletion and mutant TDP-43 M337V expression
-
Novel insights into the Leishmania infantum transcriptome diversity of protein-coding and non-coding sequences in both stages of parasite development using nanopore direct RNA sequencing
-
MF2S-CID: A dynamic multi-model framework for scalable and interpretable intrusion detection
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part III
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part V
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VIII
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part IV
-
Predictive goal coding by dentate gyrus somatostatin-expressing interneurons in male mice
-
A simple inner-product functional encryption scheme from the inverse-DDH assumption
-
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage
-
XMID-MQTT: explaining machine learning-based intrusion detection system for MQTT protocol in IoT environment