Applied Sciences | Free Full-Text | A Graph-Based Differentially Private Algorithm for Mining Frequent Sequential Patterns
The basic mechanism | Contemporary Automata
DE112006002892T5 - Systems and methods for switching between autonomous and manual operation of a vehicle - Google Patents
Recognizing Fake identities in Online Social Networks based on a Finite Automaton approach | Semantic Scholar
Recognition-of-tokens
Frontiers | The Thalamus as a Blackboard for Perception and Planning
Energies | Free Full-Text | Accessible Modeling of the German Energy Transition: An Open, Compact, and Validated Model
PDF) Proceedings Fourth International Symposium on Games, Automata, Logics and Formal Verification | Tiziano Villa - Academia.edu
CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare | SpringerLink
Pint: A Static Analyzer for Transient Dynamics of Qualitative Networks with IPython Interface
Untitled
IoT | Free Full-Text | Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
ICT-32-2014: Cybersecurity, Trustworthy ICT WITDOM “empoWering prIvacy and securiTy in non-trusteD envirOnMents” D3.5 – WI
SnT Annual Report 2018 by Uni.lu_SnT - Issuu
PDF] SQuAD2-CR: Semi-supervised Annotation for Cause and Rationales for Unanswerability in SQuAD 2.0 | Semantic Scholar
JLPEA | Free Full-Text | A Standard-Cell-Based CMFB for Fully Synthesizable OTAs
Recognition-of-tokens
Application layer classification of Internet traffic using ensemble learning models - Arfeen - 2021 - International Journal of Network Management - Wiley Online Library