Search alternatives:
"experiential" » "experiencing" (Expand Search)
"experientially" » "experiencingly" (Expand Search), "experimentally" (Expand Search)
"experimentalalallysssal" » "experimentallyallysssal" (Expand Search)
"experimentalal" » "experimentally" (Expand Search)
"experimentalalalsally" » "experimentallyalsally" (Expand Search)
"experimentalally" » "experimentallyly" (Expand Search), "experimentally" (Expand Search)
"experimentsally" » "experimentally" (Expand Search)
"experienced" » "experiences" (Expand Search)
"experimentsum" » "experimentum" (Expand Search), "experiment" (Expand Search)
"experimentss" » "experiment" (Expand Search), "experimentum" (Expand Search), "experiences" (Expand Search)
"experimentssally" » "experimentally" (Expand Search), "experimentumally" (Expand Search), "experiencesally" (Expand Search)
"experimentsssalsly" » "experimentsalsly" (Expand Search), "experimentumsalsly" (Expand Search), "experiencessalsly" (Expand Search), "experimentally" (Expand Search)
"experimentsselle" » "experimentelle" (Expand Search), "experimentumelle" (Expand Search), "experienceselle" (Expand Search), "experimentally" (Expand Search)
"experimentsalsumsals" » "experimentallyumsals" (Expand Search)
"experimentsals" » "experimentally" (Expand Search)
"experimentsalsalsly" » "experimentallyalsly" (Expand Search)
"experimentelle" » "experimentally" (Expand Search)
"experimentalsly" » "experimentally" (Expand Search)
"experimentselleally" » "experimentallyally" (Expand Search)
"experimentselle" » "experimentally" (Expand Search)
"experimentalelle" » "experimentally" (Expand Search)
Showing 108,881 - 108,900 results of 126,266 for search '(("experimental" OR (((("experiential" OR "experiential") OR "experimentalalallysssal") OR ("experimentalal" OR "experimentsally")) OR ("experienced" OR "experience"))) OR ((("experimentsalsumsals" OR ("experiments" OR "experimentsum")) OR ("experimentss" OR "experimentsals")) OR ((("experimentssally" OR "experimentalalalsally") OR ((("experimentsally" OR "experimentalally") OR "experimentelle") OR "experientially")) OR ("experimentalsly" OR (("experimentsssalsly" OR "experimentsalsalsly") OR ("experimentselleally" OR (("experimentselle" OR "experimentalelle") OR "experimentsselle")))))))', query time: 1.55s Refine Results
  1. 108881

    GeoRisk 2011 : geotechnical risk assessment and management : Proceedings of GeoRisk 2011, June 26-28, 2011, Atlanta, Georgia

    New York : American Society of Civil Engineers, 2011
    Table of Contents: “…Louis -- Study on Risk Assessment for an Individual Landslide -- Geohazard Interpretation of the Cagliari Slope (Southern Sardinia, Italy) -- Delineation of Slope Profiles from Digital Elevation Models for Landslide Hazard Analysis -- Establishing Confidence in Surface Wave Determined Soil Profiles -- Surface Wave Benchmarking Exercise : Methodologies, Results, and Uncertainties -- Analysis of Surface Wave Benchmarking Data -- An Assessment of Surface Wave Techniques at the Texas A & M National Geotechnical Experimentation Site -- Analysis and Interpretation of the Texas A & M University Benchmark Data Using the Refraction Microtremor Technique -- Determination of the Dynamic Soil Characteristics at the NGES -- Analysis of SASW, MASW, and Passive Surface Wave Data Collected at the National Geotechnical Experimentation Site at Texas A & M University -- Active Risk Management in Geotechnical Engineering -- Risk Assessment of Success Dam, California : Flood Related Potential Failure Modes -- Geotechnical Risk in the Peruvian Andes -- Quantified Risk Assessment of Shield Tunneling Effects on Urban Cement Concrete Pavement -- Risk Assessment of Success Dam, California : Earthquake Induced Potential Failure Modes -- A Parametric Study on Factors Affecting Ground Vibrations during Pile Driving through Finite Element Simulations -- Tunnel Face Support Pressure and Associated Risk -- Risk Analysis of Pile Pressing-In on an Adjacent Earth-Retaining Wall -- Numerical Study on the Dynamic Behavior of Retaining Walls Backfilled with Shredded Tires -- Probabilistic Analysis of the Deflection of Retaining Walls in Deep Excavation -- Risk Management with Performance-Based Geoengineering Monitoring: APM Tunnel Extension at Hartsfield-Jackson International Airport -- Probability-Based Risk Assessment of Landslide/Slope Failure -- Road Slopes Risk Assessment of the Northern Part of Gifu Prefecture, Japan -- Managing Settlement Risk Due to Tunneling beneath Downtown Seattle -- Assessing the Probability of Occurrence of Earthquake-Induced Landslides Offshore the U.S. …”
    Format: Electronic Conference Proceeding eBook
    Full text (Wentworth users only)
  2. 108882

    Information and Communicatiaon Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings by Mustofa, Khabib

    Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013
    Table of Contents: “….- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting P.…”
    Format: Electronic eBook
    Full text (Wentworth users only).
  3. 108883

    An introduction to search engines and web navigation by Levene, M. (Mark), 1957-

    Hoboken, N.J. : Wiley, 2010
    Table of Contents: “…7: Navigating The Web -- 7-1: Frustration in Web browsing and navigation -- 7-1-1: HTML and Web site design -- 7-1-2: Hyperlinks and surfing -- 7-1-3: Web site design and usability -- 7-2: Navigation tools -- 7-2-1: Basic browser tools -- 7-2-2: Back and forward buttons -- 7-2-3: Search engine toolbars -- 7-2-4: Bookmarks tool -- 7-2-5: History list -- 7-2-6: Identifying Web pages -- 7-2-7: Breadcrumb navigation -- 7-2-8: Quicklinks -- 7-2-9: Hypertext orientation tools -- 7-2-10: Hypercard programming environment -- 7-3: Navigational metrics -- 7-3-1: Potential gain -- 7-3-2: Structural analysis of a Web site -- 7-3-3: Measuring the usability of Web sites -- 7-4: Web data mining -- 7-4-1: Three perspectives on data mining -- 7-4-2: Measuring the success of a Web site -- 7-4-3: Web analytics -- 7-4-4: E-metrics -- 7-4-5: Web analytics tools -- 7-4-6: Weblog file analyzers -- 7-4-7: Identifying the surfer -- 7-4-8: Sessionizing -- 7-4-9: Supplementary analyses -- 7-4-10: Markov chain model of Web site navigation -- 7-4-11: Applications of Web usage mining -- 7-4-12: Information extraction -- 7-5: Best trail algorithm -- 7-5-1: Effective view navigation -- 7-5-2: Web usage mining for personalization -- 7-5-3: Developing a trail engine -- 7-6: Visualization that aids navigation -- 7-6-1: How to visualize navigation patterns -- 7-6-2: Overview diagrams and Web site maps -- 7-6-3: Fisheye views -- 7-6-4: Visualizing trails within a Web site -- 7-6-5: Visual search engines -- 7-6-6: Social data analysis -- 7-6-7: Mapping cyberspace -- 7-7: Navigation in virtual and physical spaces -- 7-7-1: Real-world Web usage mining -- 7-7-2: Museum experience recorder -- 7-7-3: Navigating in the real world -- 8: Mobile Web -- 8-1: Paradigm of mobile computing -- 8-1-1: Wireless markup language -- 8-1-2: i-mode service -- 8-2: Mobile Web services -- 8-2-1: M-commerce -- 8-2-2: Delivery of personalized news -- 8-2-3: Delivery of learning resources -- 8-3: Mobile device interfaces -- 8-3-1: Mobile Web browsers -- 8-3-2: Information seeking on mobile devices -- 8-3-3: Text entry on mobile devices -- 8-3-4: Voice recognition for mobile devices -- 8-3-5: Presenting information on a mobile device -- 8-4: Navigation problem in mobile portals -- 8-4-1: Click-distance -- 8-4-2: Adaptive mobile portals -- 8-4-3: Adaptive Web navigation -- 8-5: Mobile search -- 8-5-1: Mobile search interfaces -- 8-5-2: Search engine support for mobile devices -- 8-5-3: Focused mobile search -- 8-5-4: Laid back mobile search -- 8-5-5: Mobile query log analysis -- 8-5-6: Personalization of mobile search -- 8-5-7: Location-aware mobile search.…”
    Format: Electronic eBook
    Access E-Book
    Full text (Wentworth users only)
  4. 108884

    Reconstruction and restoration of architectural heritage proceedings of the 2nd International Conference on Reconstruction and Renovation of the Architectural Heritage (RRAH 2020),...

    Leiden, The Netherlands : CRCPress/Balkema, 2020
    Table of Contents: “…Pasechnik</P></I><P>Renovation of coastal industrial areas. European experience of 2000s, <I>O. Pastukh & A.G. Vaitens</P></I><P>Historical and architectural heritage of railway complexes in Belgorod region, <I>M.V. …”
    Format: Electronic eBook
    Full text (WIT users only)
  5. 108885

    Environmental biotechnology : sustainable remediation of contamination in different environs

    Palm Bay, FL, USA ; Burlington, ON, Canada : Boca Raton, FL, USA ; Abingdon, Oxon, UK : Apple Academic Press ; CRC Press, 2022
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  6. 108886

    Design and development of smart surgical assistant technologies : a case study for translational sciences by Kim, Jeff J. H.

    Boca Raton : CRC Press, 2023
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  7. 108887

    Bioresource utilization and management : applications in therapeutics, biofuels, agriculture, and environmental sciences

    Palm Bay, FL, USA ; Burlington, ON, Canada : Boca Raton, FL, USA ; Abingdon, Oxon, UK : Apple Academic Press ; CRC Press, 2021
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  8. 108888
  9. 108889
  10. 108890
  11. 108891

    Set, Measure and Probability Theory by Alencar, Marcelo S.

    Milton : River Publishers, 2023
    Format: Electronic eBook
    Full text (WIT users only)
  12. 108892

    Blockchain for 6G-enabled network-based applications : a vision, architectural elements, and future directions

    Boca Raton, FL : CRC Press, 2022
    Format: Electronic eBook
    Full text (WIT users only)
  13. 108893
  14. 108894
  15. 108895

    The science of nanomaterials

    Palm Bay, FL, USA ; Burlington, ON, Canada : Boca Raton, FL, USA ; Abingdon, Oxon, UK : Apple Academic Press ; CRC Press, 2023
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  16. 108896

    Polymers in energy conversion and storage

    Boca Raton, FL : CRC Press, 2022
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  17. 108897

    Introduction to statistical process control by Qiu, Peihua, 1965-

    Boca Raton : Chapman & Hall/CRC, 2014
    Format: Electronic eBook
    Full text (Wentworth users only)
  18. 108898
  19. 108899
  20. 108900