Academic literature on the topic 'Poirot'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Poirot.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Poirot"
Sinka, Rita, Ferenc Jankovics, Kálmán Somogyi, Tamás Szlanka, Tamás Lukácsovich, and Miklós Erdélyi. "poirot,a new regulatory gene ofDrosophila oskaracts at the level of the short Oskar protein isoform." Development 129, no. 14 (2002): 3469–78. http://dx.doi.org/10.1242/dev.129.14.3469.
Full textHarmon, Lucyna. "Narratemes in Agatha Christie’s Poirot Novels." Studia Universitatis Babeș-Bolyai Philologia 66, no. 2 (2021): 33–46. http://dx.doi.org/10.24193/subbphilo.2021.2.03.
Full textBareït, Nicolas. "Rappel de Poirot." Critique 894, no. 11 (2021): 936–45. http://dx.doi.org/10.3917/criti.894.0936.
Full textCondran, Jeffrey. "Hercule Poirot Investigates." Cultural and Pedagogical Inquiry 11, no. 2 (2019): 4–15. http://dx.doi.org/10.18733/cpi29480.
Full textEckert, Kenneth. "Hercule Poirot and the Tricky Performers of Stereotypes in Agatha Christie’s Murder on the Orient Express." Text Matters: A Journal of Literature, Theory and Culture, no. 11 (November 22, 2021): 186–203. http://dx.doi.org/10.18778/2083-2931.11.13.
Full textCsorba, Mária Lujza. "Feminization of Agatha Christie´s Character Hercule Poirot through His Appearance, Personality, Age and Cat Symbolism." International Journal of English and Comparative Literary Studies 2, no. 5 (2021): 12–24. http://dx.doi.org/10.47631/ijecls.v2i5.335.
Full textBastan, Ajda. "The Hagia Sophia and the Other Turkish Locations in Agatha Christie’s “Murder On the Orient Express”." International Journal of Social, Political and Economic Research 8, no. 1 (2021): 37–46. http://dx.doi.org/10.46291/ijospervol8iss1pp37-46.
Full textDomjanović, Vedran, and Biljana Oklopčić. "MURDER AND CRIME-SOLVING STRATEGIES IN AGATHA CHRISTIE’S WORKS." Folia linguistica et litteraria XIII, no. 39 (2022): 9–29. http://dx.doi.org/10.31902/fll.39.2022.1.
Full textKerremans, Koen, Isabelle Desmeytere, Rita Temmerman, and Patrick Wille. "Application-oriented terminography in financial forensics." Terminology 11, no. 1 (2005): 83–106. http://dx.doi.org/10.1075/term.11.1.05ker.
Full textRose, Steven. "Hercule Poirot and the unquiet brain." Lancet Neurology 6, no. 4 (2007): 302. http://dx.doi.org/10.1016/s1474-4422(07)70071-6.
Full textDissertations / Theses on the topic "Poirot"
Battistini, Riccardo. "Descriptive Text Mining in ambito medico: applicazione della metodologia POIROT." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24781/.
Full textCeroni, Samuele. "Time-evolving knowledge graphs based on Poirot: dynamic representation of patients' voices." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23095/.
Full textMenegheti, Pollyanna Souza [UNESP]. "De Holmes a Poirot: relações entre literatura e história na narrativa policial britânica." Universidade Estadual Paulista (UNESP), 2014. http://hdl.handle.net/11449/115731.
Full textMenegheti, Pollyanna Souza. "De Holmes a Poirot : relações entre literatura e história na narrativa policial britânica /." Araraquara, 2014. http://hdl.handle.net/11449/115731.
Full textLott, Monica L. "Seventy Years of Swearing upon Eric the Skull: Genre and Gender in Selected Works by Detection Club Writers Dorothy L. Sayers and Agatha Christie." Kent State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=kent1366152840.
Full textGhosh, Arundhati. "From Holmes to Sherlock: Confession, Surveillance, and the Detective." Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1376495997.
Full textVENDRAMINI, ORLANDO MARCELO. "Contribution a la sauvegarde du baudet du poitou par la mise au point d'une technique de transfert d'embryon." Rennes 1, 1997. http://www.theses.fr/1997REN10057.
Full textChevallier, Marjolaine. "Pierre Poiret (1646-1719) : du protestantisme à la mystique /." Genève : [Paris] : Labor et fides ; [diff. Cerf], 1993. http://catalogue.bnf.fr/ark:/12148/cb356895605.
Full textChevallier, Marjolaine. "Pierre Poiret (1646-1719), cartésien et mystique." Lille 3 : ANRT, 1989. http://catalogue.bnf.fr/ark:/12148/cb37612721z.
Full textPeukert, Amanda. "Poison." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10785348.
Full textBooks on the topic "Poirot"
Christie, Agatha. Poirot investigates: A Hercule Poirot mystery. Center Point Pub., 2011.
Find full textChristie, Agatha. Hercule Poirot's Christmas: A Hercule Poirot mystery. Black Dog & Leventhal, 2007.
Find full textChristie, Agatha. Poirot's Early Cases (Poirot). HarperCollins Publishers Ltd, 2002.
Find full textBook chapters on the topic "Poirot"
Qadeer, Shaz. "Poirot—A Concurrency Sleuth." In Formal Methods and Software Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24559-6_3.
Full textElliott, Bridget. "From Poirot to Bioshock." In The Routledge Companion to Art Deco. Routledge, 2019. http://dx.doi.org/10.4324/9780429032165-20.
Full textAldridge, Mark. "Chapter 12: Agatha Christie’s Poirot." In Agatha Christie on Screen. Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-37292-5_13.
Full textTanner, Kesler, Naomi Johnson, and James A. Landay. "Poirot: A Web Inspector for Designers." In Understanding Innovation. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-28960-7_14.
Full textBerger, Arthur Asa. "Hercules (aka Herakles) and Hercule Poirot." In Media, Myth, and Society. Palgrave Macmillan US, 2013. http://dx.doi.org/10.1057/9781137301673_6.
Full textAldridge, Mark. "Chapter 8: Peter Ustinov as Hercule Poirot." In Agatha Christie on Screen. Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-37292-5_9.
Full textAldridge, Mark. "Chapter 2: Poirot Comes to the Silver Screen." In Agatha Christie on Screen. Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-37292-5_3.
Full textEndicott-Popovsky, Barbara, and Deborah A. Frincke. "Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations." In Foundations of Augmented Cognition. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73216-7_41.
Full textNowak, Helge. "›Alter Schwede!‹." In Alter(n)skulturen. transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839459928-013.
Full textZaller, Johann G. "What Is the Problem? Pesticides in Our Everyday Life." In Daily Poison. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50530-1_1.
Full textConference papers on the topic "Poirot"
Tanner, Kesler, Naomi Johnson, and James A. Landay. "Poirot." In CHI '19: CHI Conference on Human Factors in Computing Systems. ACM, 2019. http://dx.doi.org/10.1145/3290605.3300758.
Full textMilajerdi, Sadegh M., Birhanu Eshete, Rigel Gjomemo, and V. N. Venkatakrishnan. "POIROT." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3363217.
Full textBurstein, Mark H., Fusan Yaman, Robert M. Laddaga, and Robert J. Bobrow. "POIROT." In the fifth international conference. ACM Press, 2009. http://dx.doi.org/10.1145/1597735.1597758.
Full textEl-Rewini, Zeinab, Zhuo Zhang, and Yousra Aafer. "Poirot." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3548606.3560710.
Full textZhang, Yanping, Chenghong Wang, David Pujol, et al. "Poirot: private contact summary aggregation." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. ACM, 2020. http://dx.doi.org/10.1145/3384419.3430603.
Full textLi, Yi, Tien N. Nguyen, Shaohua Wang, and Aashish Yadavally. "Poirot: Deep Learning for API Misuse Detection." In ICSE-Companion '24: 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings. ACM, 2024. http://dx.doi.org/10.1145/3639478.3643080.
Full textJun Lin, Chan Chou Lin, J. C. Huang, et al. "Poirot: A Distributed Tool Supporting Enterprise-Wide Automated Traceability." In 14th IEEE International Requirements Engineering Conference. IEEE, 2006. http://dx.doi.org/10.1109/re.2006.48.
Full textBurstein, Mark, Robert Bobrow, William Ferguson, Robert Laddaga, and Paul Robertson. "Learning from Observing: Vision and POIROT - Using Metareasoning for Self Adaptation." In 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW). IEEE, 2010. http://dx.doi.org/10.1109/sasow.2010.61.
Full textLee, Wei-Min, Amir Rezapour, and Wen-Guey Tzeng. "Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique." In 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422081.
Full textSrivastava, Harshvardhan. "Poirot at SemEval-2022 Task 5: Leveraging Graph Network for Misogynistic Meme Detection." In Proceedings of the 16th International Workshop on Semantic Evaluation (SemEval-2022). Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.semeval-1.110.
Full textReports on the topic "Poirot"
Simpson, W. The Point-to-Point Protocol (PPP). RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1548.
Full textSimpson, W., ed. The Point-to-Point Protocol (PPP). RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1661.
Full textHamzeh, K., G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn. Point-to-Point Tunneling Protocol (PPTP). RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2637.
Full textPerkins, D. Point-to-Point Protocol for the transmission of multi-protocol datagrams over Point-to-Point links. RFC Editor, 1990. http://dx.doi.org/10.17487/rfc1171.
Full textPerkins, D. Point-to-Point Protocol: A proposal for multi-protocol transmission of datagrams over Point-to-Point links. RFC Editor, 1989. http://dx.doi.org/10.17487/rfc1134.
Full textBaker, F. Point-to-Point Protocol extensions for bridging. RFC Editor, 1991. http://dx.doi.org/10.17487/rfc1220.
Full textPall, G. Microsoft Point-To-Point Compression (MPPC) Protocol. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2118.
Full textPall, G., and G. Zorn. Microsoft Point-To-Point Encryption (MPPE) Protocol. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3078.
Full textCarlson, J., and R. Winslow. Point-to-Point Protocol (PPP) Vendor Protocol. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3772.
Full textKrogmeier, J., and Michael Fitz. Borman Expressway Point-to-Point Wireless Modem. Purdue University, 2000. http://dx.doi.org/10.5703/1288284313156.
Full text