Parcourir
Présentations récentes
Recent Stories
Sujets de contenu
Contenu mis à jour
Contenu en vedette
Modèles PowerPoint
Créer
Présentation
Article
Etude
Quiz
Formulaire d'inscription
E-Book / Livres électroniques
Concepteur de la présentation
Créez une présentation époustouflante en ligne en seulement 3 étapes.
Pro
Obtenez des outils puissants pour gérer vos contenus.
Connexion
Télécharger
Content Directory
Content Directory
d
detecting-arctic -> determining-risk
detecting-duplic -> detecting-large-
Detecting language contact in Indo-European
Detecting Duplicates over Sliding Windows with RAM-Efficient Detached Counting Bloom Filter Arrays
Detecting Duplicates over Sliding Windows with RAM-Efficient Detached Counting Bloom Filter Arrays
Detecting Early Signs of Insider Attack Using Role-Based Analysis and Classification
DETECTING EARNINGS MANAGEMENT
Detecting Earnings Management Dechow , Sloan, Sweeney (1995)
Detecting Earth-Skimming and Mountain-Penetrating Tau Neutrinos
Detecting Eavesdropping A Solution
Detecting Eavesdropping A Solution
Detecting Ecological Effects of Development in the Wappingers and Fishkill Watersheds
Detecting Economic Events Using a Semantics-Based Pipeline
Detecting Ecosystem Stress and Declining Integrity: Indicators and Benchmarks
Detecting Einstein’s Elusive Waves Opening a New Window to the Universe
Detecting Einstein’s Elusive Waves Opening a New Window to the Universe
Detecting (elastic and inelastic) diffraction at the LHC
Detecting Electrons: CCD vs Film
Detecting Electrons: CCD vs Film
Detecting elements and compounds
Detecting elusive warning signs of the migraine attack -an Ecological Momentary Assessment study-
Detecting Emergent Behavior In Distributed Systems Caused By Overgeneralization
Detecting Endocrine Disrupting Compounds in Wastewater with GC-MS
Detecting enriched regions (Chip- seq , RIP- seq ) Statistical evaluation of enriched regions
Changes in NRPP Device and Proficiency Elements
Detecting Erroneous Sentences using Automatically Mined Sequential Patterns
Detecting Error and Clinical Consequences
Detecting EUV waves
Detecting Evasion Attack at High Speed without Reassembly
Detecting Evasion Attack at High Speed without Reassembly
Detecting Evasion Attacks at High Speeds without Reassembly George Varghese J. Andrew Fingerhut Flavio Bonomi in ACM SIG
Detecting Exo-Planet Transits: Adventures in Milli-mag Photometry
Detecting Exo-Planet Transits: Adventures in Milli-mag Photometry
Detecting Exoplanets and Exomoons
Detecting Exoplanets and Exomoons
Detecting Faces in Images : A Survey
Detecting factors of Syndesmotic injury in Ankle Fx . in radiograph
Detecting faint submm galaxies using RADIO lensing the case of the cluster MS0451
Detecting fake materials
Detecting Fake Websites: The Contribution of Statistical Learning Theory
Detecting Faking on Noncognitive Assessments Using Decision Trees
Detecting False Captioning Using Common Sense Reasoning
DETECTING FATIGUE FROM VOICE USING SPEECH RECOGNITION
DETECTING FATIGUE FROM VOICE USING SPEECH RECOGNITION
Detecting Features in the Cosmic Ray Positron Spectrum with PAMELA and AMS-02
Detecting flames and insults in text
Detecting foodborne disease outbreaks using social media
Detecting Forged Documents with Signature Verification Test!
Detecting Forged TCP Reset Packets
Detecting Forged TCP Reset Packets
Detecting Forged TCP Reset Packets
Detecting Format String Vulnerabilities with Type Qualifier
Detecting Format String Vulnerabilities with Type Qualifier
Detecting Fourth Generation Heavy Quarks at The LHC
Why Crystal Structure Validation ?
Detecting Fraud Using Benford’s Law
Detecting Fraudulent Clicks From BotNets 2.0
Detecting Fraudulent Personalities in Networks of Online Auctioneers
Detecting g -ray Sources
Detecting g -ray Sources
Detecting g -ray Sources
Detecting g -ray Sources
Detecting galactic structure via the annual modulation signal of WIMPs
Detecting Gambling Sites From Post Behaviors
Detecting Gene-Environment and Gene-Gene Interactions through Endophenotypes
Detecting gene flow from GM crops to wild relatives
Detecting gene flow from GM crops to wild relatives
Detecting gene-gene interactions in SNP-association studies
Detecting Genre Shift
Detecting Genuine M ulti -qubit Entanglement with Two Local Measurement Settings
Detecting Genuine M ulti -qubit Entanglement with Two Local Measurement Settings
Detecting Giant Monopole Resonances
Detecting Gravitational-waves with Interferometers
Detecting Gravitational Waves with Pulsars
Detecting GRB ν ’s – an Opportunity For Observing Lorentz Invariance Violation
Detecting Group Differences: Mining Contrast Sets
Detecting ‘Heat’ with Light: Luminescent Sensors for Capsaicin
Detecting HGT: unlikely presence/absence
Detecting Hidden Attacks through the Mobile App-Web Interfaces
Detecting Hidden File System Problems
Detecting Hidden Issues - Why Sewer Surveys important
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
Detecting Hidden Patterns_ Insights from Ambulatory BP Monitoring Machines
Detecting Hidden Patterns_ Insights from weighing Machines
Detecting horizontal gene transfers using discrepancies in species and gene classifications
Detecting horizontal gene transfers using discrepancies in species and gene classifications
Detecting horizontal gene transfers using discrepancies in species and gene classifications
Detecting horizontal gene transfers using discrepancies in species and gene classifications
Detecting Household Production
Detecting Household Production
Detecting HPV in Men
Detecting human activities using smartphones and maps
Detecting human influence on extreme daily temperature at regional scales
Detecting Hydrologic Responses to Earthquakes using Support Vector Machines
Detecting ICMP Rate-Limiting
Detecting Image Features: Corner
Detecting Image Region Duplication Using SIFT Features
Detecting Implicit Collaboration Patterns
Detecting Imposters at Point of Entry Are Your Practices Sterling ?
Detecting Improper Laboratory Practices
Detecting In-Flight Page Changes with Web Tripwires
Detecting Incapacity
Detecting Incapacity
Detecting Inefficiently-Used Containers to Avoid Bloat
Detecting Inefficiently-Used Containers to Avoid Bloat
Detecting Infectious HIV in Human Milk
Detecting Influenza Epidemics Using Search Engine Query Data
Detecting influenza epidemics using search engine query data
Detecting Influenza Outbreaks by Analyzing Twitter Messages
Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
Detecting Insider Threats for Enhanced Organizational Security
Detecting Insider Trading
Detecting Insider Trading
Detecting Insider Trading
Detecting Interaction Coupling from Task Interaction Histories
Detecting Intermittent Turbulence Using Advanced Signal Processing Techniques
Detecting Intermittent Turbulence Using Advanced Signal Processing Techniques
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Detecting Intruders from log files and traces
Detecting Intrusions on Windows Operating Systems by Monitoring System Services
Detecting Inversions in Human Genome
Detecting Ionising Radiation
Detecting Ionising Radiation
Detecting Ionising Radiation
Detecting Item Parameter Drift in a CAT program using the Rasch Measurement Model
Detecting Item Parameter Drift in a CAT program using the Rasch Measurement Model
Detecting Kernel-level Rootkits using Data Structure Invariants
Detecting Kernel-level Rootkits using Data Structure Invariants
Detecting Land Cover Land Use Change in Las Vegas
Detecting language contact in Indo-European
Detecting language contact in Indo-European
Browse slideshows:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9