×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of eitan
Study of an Analog Computer System for Reconstruction of Three-Dimensional Figures from Planar Projections
214 views
Effect of pixelation on the switching speeds of InSb bistable elements
212 views
Comparison between the Landau–Teller and flux-flux methods for computing vibrational energy relaxation rate constants in the condensed phase
215 views
Low intensity ultrasound perturbs cytoskeleton dynamics
212 views
Strong Stability-Preserving High-Order Time Discretization Methods
212 views
Entropy stability theory for difference approximations of nonlinear conservation laws and related time-dependent problems
212 views
Discrete viscous sheets
215 views
The effects of Israeli use of coercive and conciliatory tactics on Palestinian's use of terrorist tactics: 2000–2006
216 views
[IEEE GLOBECOM 2010 - 2010 IEEE Global Communications Conference - Miami, FL, USA (2010.12.6-2010.12.10)] 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 - A Nash-Stackelberg
212 views
Calculation from First Principles of Intramolecular Golden-Rule Rate Constants for Photo-Induced Electron Transfer in Molecular Donor–Acceptor Systems
216 views
[Handbook of Clinical Neurology] Neurologic Aspects of Systemic Disease Part I Volume 119 || Nonsteroidal anti-inflammatory drugs exposure and the central nervous system
216 views
Improving the transport performance in delay tolerant networks by random linear network coding and global acknowledgments
212 views
[Lecture Notes in Computer Science] Multicore Software Engineering, Performance, and Tools Volume 8063 ||
228 views
The use of skin substitutes in the treatment of the hand and upper extremity
212 views
Non-genomic events determining the sensitivity of hemopoietic malignancies to glucocorticoid-induced apoptosis
213 views
Mild-split SUSY with flavor
216 views
[Lecture Notes in Computer Science] Decision and Game Theory for Security Volume 7037 || Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game
213 views
[Lecture Notes in Computer Science] Decision and Game Theory for Security Volume 7037 || Exploiting Adversary’s Risk Profiles in Imperfect Information Security Games
212 views
[Lecture Notes in Computer Science] Decision and Game Theory for Security Volume 7037 || Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks
212 views
[Lecture Notes in Computer Science] Decision and Game Theory for Security Volume 7037 ||
246 views
Next >