Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

fetal vulnerability

Known as: fetus vulnerability 
 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Maltreatment in childhood is associated with a significantly increased likelihood of psychiatric disorder that endures across the… Expand
  • figure 1
Is this relevant?
2015
2015
Evaluation of aquifer vulnerability comprehends the integration of very diverse data, including soil characteristics (texture… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2014
2014
A B S T R A C T Global analyses of vulnerability reveal generic insights into the relation between socio-ecological systems and… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2013
2013
  • Zoran Djuric
  • Second International Conference on Informatics…
  • 2013
  • Corpus ID: 14911616
Web applications vulnerabilities allow attackers to perform malicious actions that range from gaining unauthorized account access… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2013
2013
PURPOSE Patients with medial temporal lobe epilepsy (MTLE) exhibit structural brain damage involving gray matter (GM) and white… Expand
Is this relevant?
2011
2011
Vulnerability assessment is considered an effective tool in establishing monitoring networks required for controlling potential… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2010
2010
The cornerstone of a Smart Grid is the ability for multiple entities to interact via communication networks. A scalable and… Expand
  • table I
  • figure 2
  • table III
  • table II
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Charge sharing between adjacent devices can lead to increased Single Event Upset (SEU) vulnerability. Key parameters affecting… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
2006
2006
In the Secure Internet Programming laboratory at Princeton University, we have been investigating network security management by… Expand
  • figure 1
Is this relevant?
2005
2005
The application cross section "/spl sigma//sub AP/" is a parameter used to characterize the systems single event upset (SEU… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?