Suh, Alexander
19  results:
Search for persons X
?
1

Horizontal Transfer of Transposons as Genomic Fossils of Ho..:

, In: Topics in Geobiology; The Evolution and Fossil Record of Parasitism,
Suh, Alexander - p. 451-463 , 2021
 
?
2

Adapting bug prediction models to predict reverted commits ..:

, In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering,
Suh, Alexander - p. 1251-1262 , 2020
 
?
3

Repetitive DNA: The Dark Matter of Avian Genomics:

, In: Avian Genomics in Ecology and Evolution,
 
?
4

Cloaking of Rectangular Patch Antenna Arrays with Coated Me..:

, In: 2023 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (USNC-URSI),
Pawar, Shefali ; Skinner, Harry G. ; Suh, Seong-Youp. - p. 1631-1632 , 2023
 
?
5

Metasurface Cloaks for Reduction of Mutual Coupling in Slot..:

, In: 2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI),
 
?
6

Contributing Authors:

, In: Distal Radius Fractures,
 
?
7

Contributors:

, In: Surgery of the Thyroid and Parathyroid Glands,
 
?
8

How to Decouple and Cloak Interleaved Phased Arrays?:

, In: 2020 Fourteenth International Congress on Artificial Materials for Novel Wave Phenomena (Metamaterials),
 
?
9

Contributors:

, In: Biobased Surfactants,
 
?
10

Metasurface Cloaks for Decoupling Closely Spaced Phased Ant..:

, In: 2019 URSI International Symposium on Electromagnetic Theory (EMTS),
 
?
11

Contributors:

, In: Atlas of Endoscopic Sinus and Skull Base Surgery,
 
?
12

Contributors:

, In: Neurological Complications of Systemic Cancer and Antineoplastic Therapy,
 
?
13

Wireless Charging Power Side-Channel Attacks:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
 
?
14

Contributors:

, In: Abernathy's Surgical Secrets,
 
?
15

Secure Autonomous Cyber-Physical Systems Through Verifiable..:

, In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy,
 
1-15