Abstract: Advanced persistent threats (APTs) pose significant risks to national infrastructure and corporate security. System logs record interactions between system entities, which are widely used ...
Abstract: Scale-invariant feature transform (SIFT) is a classical computer vision technique for scale-invariant keypoint detection and feature extraction. SIFT exhibits invariance to various ...
ABSTRACT: The accuracy of the T2 cutoff value directly impacts the precision of calculating bound fluid saturation, mobile fluid porosity, and permeability in nuclear magnetic resonance (NMR) ...
ABSTRACT: The accuracy of the T2 cutoff value directly impacts the precision of calculating bound fluid saturation, mobile fluid porosity, and permeability in nuclear magnetic resonance (NMR) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results