Sfoglia per Tipologia Book Part (author)
Exploitation of local symmetries for efficient performance analysis
2003 L. Capra
Exploitation of PLGA conjugates in drug delivery
2017 F. Selmin
Exploitation of Rhizosphere Microbiome Services
2019 V. Riva, E. Terzaghi, L. Vergani, F. Mapelli, E. Zanardini, C. Morosini, G. Raspa, A. Di Guardo, S. Borin
Exploitation of technological innovations along the olive oil milling process for an optimization of the plant performance
2017 R. Beghi, V. Giovenzana, R. Guidetti, A. Cappelli, A. D’Antoni, N. Menditto, E. Cini
Exploitation, integration and statistical analysis of Public Health Database and STEMI archive in Lombardia Region
2010 P. Barbieri, N. Grieco, F. Ieva, A.M. Paganoni, P. Secchi
Exploitative and explorative innovative performance : the effect of technology-based M&As
2014 F. Belussi, I. De Noni, A. Ganzaroli, L. Orsi
Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers
2017 L. Casati, A. Visconti
Exploiting alpha particle induced reaction to produce terbium theranostic radioisotopes: cross-section determination up to 70 MeV
2023 M. Colucci, G. Nigron, E. Gibertini, F.C. Bolchini, L. Confalonieri, L. Magagnin, F. Haddad, F. Groppi, S. Manenti
Exploiting application locality to design fast, low power, low complexity neural classifiers
2005 A. Alippi, F. Scotti
Exploiting body biasing for leakage reduction : a case study
2013 A. Manuzzato, F. Campi, D. Rossi, V. Liberali, D. Pandini
Exploiting Contextual Embeddings to Extract Topic Genealogy from Scientific Literature
2023 A. Ferrara, S. Montanelli, S. Picascia, D. Riva
Exploiting Diversity : The Archaeological Landscape of the Eblaite Chora
2013 S. Mantellini, M.G. Micale, L. Peyronel
Exploiting Inaccurate A Priori Knowledge in Robot Exploration
2019 M. Luperto, A. Borghese, D. Fusi, F. Amigoni
Exploiting participatory design in open innovation factories
2012 V. Bellandi, P. Ceravolo, E. Damiani, F. Frati, J. Maggesi, L. Zhu
Exploiting peer ontologies for semantic query propagation
2007 S. Castano, A. Ferrara, S. Montanelli
Exploiting point source approximation on detailed neuronal models to reconstruct single neuron electric field and population LFP
2015 H. Parasuram, B. Nair, G. Naldi, E. D'Angelo, S. Diwakar
Exploiting Quantum Gates in Secure Computation
2017 M. Ehsanpour, S. Cimato, V. Ciriani, E. Damiani
Exploiting the ASM method for validation & verification of embedded systems
2008 A. Gargantini, E. Riccobene, P. Scandurra
Exploiting the MDA approach for embedded system design
2006 S. Bocchio, E. Riccobene, A. Rosti, P. Scandurra
Exploiting the view: Venture philanthropy models across practice
2006 C. Vurro
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile