-
1
Don’t Fake It, Make It! Thriving in Virtual Conferences and Meetings
Published 2020-08-01Get full text
Article -
2
Don’t Fake It, Make It! Thriving in Virtual Conferences and Meetings
Published 2020-08-01Get full text
Article -
3
Don’t Fake It, Make It! Technology and Tools for Virtual Hosts
Published 2021-05-01“… The “Don’t Fake it, Make it!” series assists virtual conference and meeting hosts in creating an engaging program to benefit their participants. …”
Get full text
Article -
4
Don’t Fake It, Make It! Best Practices for Attending Virtual Events
Published 2020-10-01“… Continuing the Don’t Fake It, Make It! series to make the most out of virtual conferences and meetings, this fact sheet provides tips specific to attendees. …”
Get full text
Article -
5
Don’t Fake It, Make It! Best Practices for Attending Virtual Events
Published 2020-10-01“… Continuing the Don’t Fake It, Make It! series to make the most out of virtual conferences and meetings, this fact sheet provides tips specific to attendees. …”
Get full text
Article -
6
“Don’t Touch Your Face!” The Contribution of Habit Reversal in the COVID-19 Pandemic
Published 2022-11-01Get full text
Article -
7
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01“…Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete satisfiability don't care signals was demonstrated.These don't care could not be satisfied under normal operation and thus the circuit design with Trojan is functionally equivalent to the Trojan-free baseline.The attacker could activate the Trojan through simple yet effective fault injection.Experimental results on a 1024-bit RSA cryptographic core show that the proposed hardware Trojan can escape from logic synthesis optimization, and that the RSA private key can be retrieved by simply over-clocking the design.A defense technique that can effectively detect such stealthy Trojan design was provided.…”
Get full text
Article -
8
New York Writing: Urban Art in Don DeLillo’s Underworld
Published 2009-12-01“…A travers les descriptions ekphrastiques de Underworld, Don DeLillo définit la place et la nature de l’art dans la société américaine postmoderne tout en affirmant son art du roman. …”
Get full text
Article -
9
Eine »Grille« in »Händels Manier«?. Kompositionstechnik, soziale Symbolik und Dramaturgie in der zweiten Donna-Elvira-Arie aus Mozarts Don Giovanni
Published 2014-01-01“…The pseudo-archaic style of the aria »Ah fuggi il traditor« from Mozart’s opera Don Giovanni has been repeatedly dealt with in musical criticism and musical historiography since the 18th-century. …”
Get full text
Article -
10
Kiskisitotaso, Don’t Forget Yourself: Indigenous Resurgence in David A. Robertson’s Barren Grounds
Published 2025-01-01Get full text
Article -
11
-
12
Chemical Composition and Biological Activities of the Essential Oils of Chrysophyllum albidum G. Don (African Star Apple)
Published 2021-01-01“…The IC50 values obtained from the hydrogen peroxide scavenging, 1,1-diphenyl-2-picrylhydrazyl (DPPH) free radical scavenging, and inhibition of lipid peroxidation assays were 301.8 ± 0.7 and 669.2 ± 2.1 μg/mL, 1048.0 ± 0.3 and 1454.0 ± 0.3 μg/mL, and 460.1 ± 2.7 and 457.4 ± 0.3 μg/mL for both leaf and fruit essential oils, respectively. …”
Get full text
Article -
13
A dataset of Antarctic ecosystems in ice-free lands: classification, descriptions, and maps
Published 2025-01-01Get full text
Article -
14
Persistence, Fate, and Effectiveness of Dispersants used during the Deepwater Horizon Oil Spill
Published 2017-08-01Get full text
Article -
15
Persistence, Fate, and Effectiveness of Dispersants used during the Deepwater Horizon Oil Spill
Published 2017-08-01Get full text
Article -
16
-
17
Facing Terrorism Alone
Published 2003-06-01“…We feel stressed because we don’t know what to expect from day to day. This is a particularly difficult time for older adults who live alone. …”
Get full text
Article -
18
Facing Terrorism Alone
Published 2003-06-01“…We feel stressed because we don’t know what to expect from day to day. This is a particularly difficult time for older adults who live alone. …”
Get full text
Article -
19
Investigating Equations Used to Design a Very Small Normal-Mode Helical Antenna in Free Space
Published 2018-01-01Get full text
Article -
20
Spontaneous Perforation of Common Bile Duct: A Rare Presentation of Gall Stones Disease
Published 2016-01-01Get full text
Article