Search alternatives:
"experiential" » "experiencing" (Expand Search)
"experientially" » "experiencingly" (Expand Search), "experimentally" (Expand Search)
"experimentalalallysssal" » "experimentallyallysssal" (Expand Search)
"experimentalal" » "experimentally" (Expand Search)
"experimentalalalsally" » "experimentallyalsally" (Expand Search)
"experimentalally" » "experimentallyly" (Expand Search), "experimentally" (Expand Search)
"experimentsally" » "experimentally" (Expand Search)
"experienced" » "experiences" (Expand Search)
"experimentsum" » "experimentum" (Expand Search), "experiment" (Expand Search)
"experimentss" » "experiment" (Expand Search), "experimentum" (Expand Search), "experiences" (Expand Search)
"experimentssally" » "experimentally" (Expand Search), "experimentumally" (Expand Search), "experiencesally" (Expand Search)
"experimentsssalsly" » "experimentsalsly" (Expand Search), "experimentumsalsly" (Expand Search), "experiencessalsly" (Expand Search), "experimentally" (Expand Search)
"experimentsselle" » "experimentelle" (Expand Search), "experimentumelle" (Expand Search), "experienceselle" (Expand Search), "experimentally" (Expand Search)
"experimentsalsumsals" » "experimentallyumsals" (Expand Search)
"experimentsals" » "experimentally" (Expand Search)
"experimentsalsalsly" » "experimentallyalsly" (Expand Search)
"experimentelle" » "experimentally" (Expand Search)
"experimentalsly" » "experimentally" (Expand Search)
"experimentselleally" » "experimentallyally" (Expand Search)
"experimentselle" » "experimentally" (Expand Search)
"experimentalelle" » "experimentally" (Expand Search)
"experiential" » "experiencing" (Expand Search)
"experientially" » "experiencingly" (Expand Search), "experimentally" (Expand Search)
"experimentalalallysssal" » "experimentallyallysssal" (Expand Search)
"experimentalal" » "experimentally" (Expand Search)
"experimentalalalsally" » "experimentallyalsally" (Expand Search)
"experimentalally" » "experimentallyly" (Expand Search), "experimentally" (Expand Search)
"experimentsally" » "experimentally" (Expand Search)
"experienced" » "experiences" (Expand Search)
"experimentsum" » "experimentum" (Expand Search), "experiment" (Expand Search)
"experimentss" » "experiment" (Expand Search), "experimentum" (Expand Search), "experiences" (Expand Search)
"experimentssally" » "experimentally" (Expand Search), "experimentumally" (Expand Search), "experiencesally" (Expand Search)
"experimentsssalsly" » "experimentsalsly" (Expand Search), "experimentumsalsly" (Expand Search), "experiencessalsly" (Expand Search), "experimentally" (Expand Search)
"experimentsselle" » "experimentelle" (Expand Search), "experimentumelle" (Expand Search), "experienceselle" (Expand Search), "experimentally" (Expand Search)
"experimentsalsumsals" » "experimentallyumsals" (Expand Search)
"experimentsals" » "experimentally" (Expand Search)
"experimentsalsalsly" » "experimentallyalsly" (Expand Search)
"experimentelle" » "experimentally" (Expand Search)
"experimentalsly" » "experimentally" (Expand Search)
"experimentselleally" » "experimentallyally" (Expand Search)
"experimentselle" » "experimentally" (Expand Search)
"experimentalelle" » "experimentally" (Expand Search)
-
108881
GeoRisk 2011 : geotechnical risk assessment and management : Proceedings of GeoRisk 2011, June 26-28, 2011, Atlanta, Georgia
New York : American Society of Civil Engineers, 2011Table of Contents: “…Louis -- Study on Risk Assessment for an Individual Landslide -- Geohazard Interpretation of the Cagliari Slope (Southern Sardinia, Italy) -- Delineation of Slope Profiles from Digital Elevation Models for Landslide Hazard Analysis -- Establishing Confidence in Surface Wave Determined Soil Profiles -- Surface Wave Benchmarking Exercise : Methodologies, Results, and Uncertainties -- Analysis of Surface Wave Benchmarking Data -- An Assessment of Surface Wave Techniques at the Texas A & M National Geotechnical Experimentation Site -- Analysis and Interpretation of the Texas A & M University Benchmark Data Using the Refraction Microtremor Technique -- Determination of the Dynamic Soil Characteristics at the NGES -- Analysis of SASW, MASW, and Passive Surface Wave Data Collected at the National Geotechnical Experimentation Site at Texas A & M University -- Active Risk Management in Geotechnical Engineering -- Risk Assessment of Success Dam, California : Flood Related Potential Failure Modes -- Geotechnical Risk in the Peruvian Andes -- Quantified Risk Assessment of Shield Tunneling Effects on Urban Cement Concrete Pavement -- Risk Assessment of Success Dam, California : Earthquake Induced Potential Failure Modes -- A Parametric Study on Factors Affecting Ground Vibrations during Pile Driving through Finite Element Simulations -- Tunnel Face Support Pressure and Associated Risk -- Risk Analysis of Pile Pressing-In on an Adjacent Earth-Retaining Wall -- Numerical Study on the Dynamic Behavior of Retaining Walls Backfilled with Shredded Tires -- Probabilistic Analysis of the Deflection of Retaining Walls in Deep Excavation -- Risk Management with Performance-Based Geoengineering Monitoring: APM Tunnel Extension at Hartsfield-Jackson International Airport -- Probability-Based Risk Assessment of Landslide/Slope Failure -- Road Slopes Risk Assessment of the Northern Part of Gifu Prefecture, Japan -- Managing Settlement Risk Due to Tunneling beneath Downtown Seattle -- Assessing the Probability of Occurrence of Earthquake-Induced Landslides Offshore the U.S. …”
Format: Electronic Conference Proceeding eBookFull text (Wentworth users only)
-
108882
Information and Communicatiaon Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013Table of Contents: “….- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting P.…”
Format: Electronic eBookFull text (Wentworth users only).
-
108883
An introduction to search engines and web navigation
Hoboken, N.J. : Wiley, 2010Table of Contents: “…7: Navigating The Web -- 7-1: Frustration in Web browsing and navigation -- 7-1-1: HTML and Web site design -- 7-1-2: Hyperlinks and surfing -- 7-1-3: Web site design and usability -- 7-2: Navigation tools -- 7-2-1: Basic browser tools -- 7-2-2: Back and forward buttons -- 7-2-3: Search engine toolbars -- 7-2-4: Bookmarks tool -- 7-2-5: History list -- 7-2-6: Identifying Web pages -- 7-2-7: Breadcrumb navigation -- 7-2-8: Quicklinks -- 7-2-9: Hypertext orientation tools -- 7-2-10: Hypercard programming environment -- 7-3: Navigational metrics -- 7-3-1: Potential gain -- 7-3-2: Structural analysis of a Web site -- 7-3-3: Measuring the usability of Web sites -- 7-4: Web data mining -- 7-4-1: Three perspectives on data mining -- 7-4-2: Measuring the success of a Web site -- 7-4-3: Web analytics -- 7-4-4: E-metrics -- 7-4-5: Web analytics tools -- 7-4-6: Weblog file analyzers -- 7-4-7: Identifying the surfer -- 7-4-8: Sessionizing -- 7-4-9: Supplementary analyses -- 7-4-10: Markov chain model of Web site navigation -- 7-4-11: Applications of Web usage mining -- 7-4-12: Information extraction -- 7-5: Best trail algorithm -- 7-5-1: Effective view navigation -- 7-5-2: Web usage mining for personalization -- 7-5-3: Developing a trail engine -- 7-6: Visualization that aids navigation -- 7-6-1: How to visualize navigation patterns -- 7-6-2: Overview diagrams and Web site maps -- 7-6-3: Fisheye views -- 7-6-4: Visualizing trails within a Web site -- 7-6-5: Visual search engines -- 7-6-6: Social data analysis -- 7-6-7: Mapping cyberspace -- 7-7: Navigation in virtual and physical spaces -- 7-7-1: Real-world Web usage mining -- 7-7-2: Museum experience recorder -- 7-7-3: Navigating in the real world -- 8: Mobile Web -- 8-1: Paradigm of mobile computing -- 8-1-1: Wireless markup language -- 8-1-2: i-mode service -- 8-2: Mobile Web services -- 8-2-1: M-commerce -- 8-2-2: Delivery of personalized news -- 8-2-3: Delivery of learning resources -- 8-3: Mobile device interfaces -- 8-3-1: Mobile Web browsers -- 8-3-2: Information seeking on mobile devices -- 8-3-3: Text entry on mobile devices -- 8-3-4: Voice recognition for mobile devices -- 8-3-5: Presenting information on a mobile device -- 8-4: Navigation problem in mobile portals -- 8-4-1: Click-distance -- 8-4-2: Adaptive mobile portals -- 8-4-3: Adaptive Web navigation -- 8-5: Mobile search -- 8-5-1: Mobile search interfaces -- 8-5-2: Search engine support for mobile devices -- 8-5-3: Focused mobile search -- 8-5-4: Laid back mobile search -- 8-5-5: Mobile query log analysis -- 8-5-6: Personalization of mobile search -- 8-5-7: Location-aware mobile search.…”
Format: Electronic eBookAccess E-Book
Full text (Wentworth users only)
-
108884
Reconstruction and restoration of architectural heritage proceedings of the 2nd International Conference on Reconstruction and Renovation of the Architectural Heritage (RRAH 2020),...
Leiden, The Netherlands : CRCPress/Balkema, 2020Table of Contents: “…Pasechnik</P></I><P>Renovation of coastal industrial areas. European experience of 2000s, <I>O. Pastukh & A.G. Vaitens</P></I><P>Historical and architectural heritage of railway complexes in Belgorod region, <I>M.V. …”
Format: Electronic eBookFull text (WIT users only)
-
108885
Environmental biotechnology : sustainable remediation of contamination in different environs
Palm Bay, FL, USA ; Burlington, ON, Canada : Boca Raton, FL, USA ; Abingdon, Oxon, UK : Apple Academic Press ; CRC Press, 2022
First edition.Format: Electronic eBookFull text (WIT users only)
-
108886
Design and development of smart surgical assistant technologies : a case study for translational sciences
Boca Raton : CRC Press, 2023
First edition.Format: Electronic eBookFull text (WIT users only)
-
108887
Bioresource utilization and management : applications in therapeutics, biofuels, agriculture, and environmental sciences
Palm Bay, FL, USA ; Burlington, ON, Canada : Boca Raton, FL, USA ; Abingdon, Oxon, UK : Apple Academic Press ; CRC Press, 2021
First edition.Format: Electronic eBookFull text (WIT users only)
-
108888
Nutrition and diabetes : pathophysiology and management
Boca Raton, FL : CRC Press, 2019
Second edition.Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
OCLC metadata license agreement
Full text (WIT users only)
Full text (Wentworth users only)
-
108889
Small antenna design
Burlington, MA : Newnes/Elsevier, 2006Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
108890
Learning Social Media Analytics with R.
Birmingham : Packt Publishing, 2017Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
108891
Set, Measure and Probability Theory
Milton : River Publishers, 2023Format: Electronic eBookFull text (WIT users only)
-
108892
Blockchain for 6G-enabled network-based applications : a vision, architectural elements, and future directions
Boca Raton, FL : CRC Press, 2022Format: Electronic eBookFull text (WIT users only)
-
108893
Entretien clinique : Outils et techniques de diagnostic en santé mentale.
Cork : Primento Digital Publishing, 2018Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
108894
Kase on technical analysis workbook : trading and forecasting
Hoboken, N.J. : Wiley, 2015Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
108895
The science of nanomaterials
Palm Bay, FL, USA ; Burlington, ON, Canada : Boca Raton, FL, USA ; Abingdon, Oxon, UK : Apple Academic Press ; CRC Press, 2023
First edition.Format: Electronic eBookFull text (WIT users only)
-
108896
Polymers in energy conversion and storage
Boca Raton, FL : CRC Press, 2022
First edition.Format: Electronic eBookFull text (WIT users only)
-
108897
Introduction to statistical process control
Boca Raton : Chapman & Hall/CRC, 2014Format: Electronic eBookFull text (Wentworth users only)
-
108898
Rethinking Choice of Law in Cross-Border Sales
Netherlands : Eleven International Publishing, 2018Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
108899
Intellectual and spiritual expression of non-literate peoples : proceedings of the XVII UISPP World Congress (1-7 September, Burgos, Spain). Volume 1, Session A20
Oxford : Archaeopress Publishing Ltd, 2016Format: Electronic eBookFull text (Open Access)
-
108900