• Performance evaluation of different techniques in the context of data mining- A case of an eye disease more
  • Performance evaluation of RDWT-SVD and DWT-SVD watermarking schemes more
  • Performance Evaluation of Selection Methods of Genetic Algorithm and Network Security Concerns more
  • Performance Evaluation of Surface Protection Applied to Large Vehicles more
  • Performance evaluation of SVD-based digital image watermarking scheme on print-scan and print-cam (PSPC) applications more
  • Performance Evaluation of Wavelet SVD-Based Watermarking Schemes for Color Images more
  • Performance Management Design Within Higher Education more
  • Performance Portability Through Semi-explicit Placement in Distributed Erlang more
  • Performance Review of Harmony Search, Differential Evolution and Particle Swarm Optimization more
  • Performing consumer daydreams and fantasies through digital play more
  • Performing Populism on TikTok: A Cross-National Analysis of Radical Right Visual Strategies more
  • Performing the field: the role of the researcher's identity and self in conducting interpretive consumer research more
  • PerimetryNet: A multiscale fine grained deep network for three-dimensional eye gaze estimation using visual field analysis more
  • Perinatal Sleep and Postpartum Depression more
  • Perioperative chemotherapy with or without cetuximab in patients (pts) with resectable colorectal liver metastasis (CRLM): Mature analysis of overall survival (OS) in the New EPOC randomised controlled trial more
  • Peripheral blood transplants followed by maintenance interferon in myeloma more
  • Peripheral Neuropathy Point-Of-Care Testing (Poct) With Smartphone App more
  • Persistent coagulase negative staphylococcus - What has changed? more
  • Persona cases: A technique for grounding personas more
  • Persona-driven information security awareness more
  • Personal Best Stories: Journeys into and beyond volunteering more
  • Personal epistemology more
  • Personal PKI for the smart device era more
  • Personal privacy threats: A taxonomy for risk assessment more
  • Personal privacy: Exploitation or control through technology more

Previous Next