Search Results
53. SECURITY PATTERN DETECTION IN SOFTWARE CODE USING MACHINE LEARNING ALGORITHMS
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
54. A Scheduling Framework for Decomposable Kernels on Energy Harvesting IoT Edge Nodes
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
55. Developing Molecular and Analytical Tools For the Evaluation of Mating Frequency in Social and Solitary Bees
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
56. Evaluating the impact of pigs and pasture-based housing on growth, pork quality, and welfare of finishing hogs
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
58. Photochemical C–H Heteroarylation of Unfunctionalized Aromatic N–Heterocycles
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
59. Insect-feeding traces in Eucalyptus leaves from the Eocene of Patagonia and their biogeographic connections to modern-day Australia
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
60. Deviant Behavior Analysis of 5G Core Network Implementations
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)