Zobrazeno 1 - 10
of 1 582
pro vyhledávání: '"Ceschin A"'
Autor:
Gabriele Galasso, Gianniantonio Domina, Gianluigi Bacchetta, Davide Barberis, Fabrizio Bartolucci, Laura Cancellieri, Simona Ceschin, Dario Ciaramella, Antonio Croce, Alba Cuena-Lombraña, Emanuele Del Guacchio, Dario Di Lernia, Mauro Fois, Daniel Fontana, Jacopo Franzoni, Antonio Giacò, Valentina L. A. Laface, Andrea Lallai, Michele Lonati, Jacopo Lupoletti, Alfredo Maccioni, Francesco Mascia, Giacomo Mei, Antonio Morabito, Carmelo M. Musarella, Emanuele Pelella, Antonio Pica, Lorenzo Pinzani, Lina Podda, Adriano Stinca, Marco Varricchione, Lorenzo Lastrucci
Publikováno v:
Italian Botanist, Vol 17, Iss , Pp 43-53 (2024)
In this contribution, new data concerning the distribution of vascular flora alien to Italy are presented. It includes new records and status changes from casual to naturalized for Italy or for Italian administrative regions for taxa in the genera Ca
Externí odkaz:
https://doaj.org/article/0fc3995a7fcc4f84809e48ec6d43d1ea
Autor:
Ceschin Álvaro Pigatto, Biondo-Simões Maria de Lourdes Pessole, Thomaz Beatriz Angélica Charlotte, Totsugui Joel
Publikováno v:
Acta Cirúrgica Brasileira, Vol 19, Iss 1, Pp 27-30 (2004)
OBJETIVO: O transplante autólogo de tecido ovariano tem sido objeto de estudo de diversos pesquisadores pela perspectiva de manter a funcionalidade deste órgão, mesmo não localizado em seu sítio habitual, sendo daí removido, a fim de minimizar
Externí odkaz:
https://doaj.org/article/02a085bd5d9a4dee8226db2b849d48d5
Autor:
Ceschin, Fabrício, Botacin, Marcus, Gomes, Heitor Murilo, Pinagé, Felipe, Oliveira, Luiz S., Grégio, André
Malware is a major threat to computer systems and imposes many challenges to cyber security. Targeted threats, such as ransomware, cause millions of dollars in losses every year. The constant increase of malware infections has been motivating popular
Externí odkaz:
http://arxiv.org/abs/2205.12311
Publikováno v:
In Resources, Conservation & Recycling Advances May 2024 21
Autor:
Giovanini, Luiz, Ceschin, Fabrício, Silva, Mirela, Chen, Aokun, Kulkarni, Ramchandra, Banda, Sanjay, Lysaght, Madison, Qiao, Heng, Sapountzis, Nikolaos, Sun, Ruimin, Matthews, Brandon, Wu, Dapeng Oliver, Grégio, André, Oliveira, Daniela
This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profile
Externí odkaz:
http://arxiv.org/abs/2105.09900
The $\text{T}\bar{\text{T}}$-deformed classical Lagrangian of a 2D Lorentz invariant theory can be derived from the original one, perturbed only at first order by the bare $\text{T}\bar{\text{T}}$ composite field, through a field-dependent change of
Externí odkaz:
http://arxiv.org/abs/2012.12760
Autor:
Silva, Mirela, Ceschin, Fabrício, Shrestha, Prakash, Brant, Christopher, Gilda, Shlok, Fernandes, Juliana, Silva, Catia S., Grégio, André, Oliveira, Daniela, Giovanini, Luiz
Misinformation entails the dissemination of falsehoods that leads to the slow fracturing of society via decreased trust in democratic processes, institutions, and science. The public has grown aware of the role of social media as a superspreader of u
Externí odkaz:
http://arxiv.org/abs/2012.02164
Autor:
Bruni, Oliviero, Breda, Maria, Malorgio, Emanuela, Brambilla, Paolo, Ceschin, Flavia, Di Pilla, Andrea, Elia, Maurizio, Ferri, Raffaele
Publikováno v:
In European Journal of Paediatric Neurology January 2024 48:40-45
Autor:
Lee, Vincent K.1,2 (AUTHOR) rcc10@pitt.edu, Ceschin, Rafael2,3 (AUTHOR) william.reynolds@chp.edu, Reynolds, William T.2,3 (AUTHOR) benjamin.meyers2@chp.edu, Meyers, Benjamin2 (AUTHOR) julia.wallace@chp.edu, Wallace, Julia2 (AUTHOR), Landsittel, Douglas4 (AUTHOR) dplansit@buffalo.edu, Joseph, Heather M.5 (AUTHOR) liebherrh@upmc.edu, Badaly, Daryaneh6 (AUTHOR) daryaneh.badaly@childmind.org, Gaynor, J. William7 (AUTHOR) gaynor@chop.edu, Licht, Daniel8 (AUTHOR) dlicht@childrensnational.org, Greene, Nathaniel H.9 (AUTHOR) nathanielgreene@me.com, Brady, Ken M.10 (AUTHOR) brady.ken@gmail.com, Hunter, Jill V.11,12 (AUTHOR) jvhunter@texaschildres.org, Chu, Zili D.11,12 (AUTHOR) zdchu@texaschildrens.org, Wilde, Elisabeth A.11,12,13 (AUTHOR) elisabeth.wilde@hsc.utah.edu, Easley, R. Blaine14 (AUTHOR) beasley@texaschildrens.org, Andropoulos, Dean14,15 (AUTHOR) dbandrop@texaschildrens.org, Panigrahy, Ashok1,2,3 (AUTHOR) apanigrahyranjan@gmail.com
Publikováno v:
Journal of Clinical Medicine. May2024, Vol. 13 Issue 10, p2922. 16p.
Autor:
Ceschin, Fabrício, Botacin, Marcus, Bifet, Albert, Pfahringer, Bernhard, Oliveira, Luiz S., Gomes, Heitor Murilo, Grégio, André
Publikováno v:
Digital Threats 2023
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in that field. However, it is very difficult to evaluate how good the produced solutions are, since the challenges f
Externí odkaz:
http://arxiv.org/abs/2010.16045