Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
function computation » function decomposition, section computational
programming learning » programmed learning, programming using, programming building
function computing » education computing, generation computing
learning theory » learning through
theory coding » theory colin, theory choosing
function computation » function decomposition, section computational
programming learning » programmed learning, programming using, programming building
function computing » education computing, generation computing
learning theory » learning through
theory coding » theory colin, theory choosing
1
Publicado 2007
Tabla de Contenidos:
“... -- Survival by Deception -- How to Secure Bluetooth-Based Pico Networks -- Learning from Your Elders: A...”Enlace del recurso
Electrónico
eBook
2
Publicado 2007
Tabla de Contenidos:
“... Games -- Computing Symmetric Boolean Functions by Circuits with Few Exact Threshold Gates...”Enlace del recurso
Electrónico
eBook
3
Publicado 2007
Tabla de Contenidos:
“...Roadmapping and i-Systems -- Exploring Computational Scheme of Complex Problem Solving Based...”Enlace del recurso
Electrónico
eBook
4
Publicado 2010
Tabla de Contenidos:
“... Facing Government Use of Cloud Computing -- Open Source Software (OSS) Adoption Framework for Local...”Enlace del recurso
Electrónico
eBook
5
Publicado 2007
Tabla de Contenidos:
“... Theorem Proving Method Using Logical Reinforcement Learning -- Gene Expression Programming with DAG...”Enlace del recurso
Electrónico
eBook
6
Publicado 2008
Tabla de Contenidos:
“... -- The Complexity of Boolean Formula Minimization -- Optimal Cryptographic Hardness of Learning Monotone Functions...”Enlace del recurso
Electrónico
eBook
7
Publicado 2010
Tabla de Contenidos:
“...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...”Enlace del recurso
Electrónico
eBook
8
Publicado 2008
Tabla de Contenidos:
“... for Supercomputing Applications - DEISA -- Towards Networked Computers: What Can Be Learned from Distributed...”Enlace del recurso
Electrónico
eBook
9
Publicado 2014
Tabla de Contenidos:
“... Networks to Enhance Customer Lifetime Predictions -- A Note on Machine Learning Approach to Analyze...”Enlace del recurso
Electrónico
eBook
10
Publicado 2014
Tabla de Contenidos:
“... to Understand It -- Part Lessons Learned and Agile Maturity -- Maturing in Agile: What Is It About? -- Why We...”Enlace del recurso
Electrónico
eBook
11
Publicado 2014
Tabla de Contenidos:
“... Grid -- Network Selection Mechanism for Future Generation Network Using Game Theory Model -- Research...”Enlace del recurso
Electrónico
eBook
12
Publicado 2012
Tabla de Contenidos:
“... Hard-to-Invert Leakage -- Completeness for Symmetric Two-Party Functionalities - Revisited...”Enlace del recurso
Electrónico
eBook
13
Publicado 2005
Tabla de Contenidos:
“...Full Papers -- Verifying the Incorrectness of Programs and Automata -- Generating Admissible...”Enlace del recurso
Electrónico
eBook
14
por Muller, Jean-Michel., Muller, Jean-Michel., Brisebarre, Nicolas., de Dinechin, Florent., Jeannerod, Claude-Pierre., Lefèvre, Vincent., Melquiond, Guillaume., Revol, Nathalie., Stehlé, Damien., Torres, Serge.
Publicado 2010
Tabla de Contenidos:
“... Arithmetic -- Elementary Functions -- Evaluating Floating-Point Elementary Functions -- Solving the Table...”Publicado 2010
Enlace del recurso
Electrónico
eBook
15
Publicado 2008
Tabla de Contenidos:
“... Simulated Agent -- Learning to Generalize through Predictive Representations: A Computational Model...”Enlace del recurso
Electrónico
eBook
16
Publicado 2007
Tabla de Contenidos:
“...Data Analysis, Modelling, and Learning -- Taking Class Importance into Account -- Tolerance Based...”Enlace del recurso
Electrónico
eBook
17
Publicado 2015
Tabla de Contenidos:
“... of the Incidence Matrices to Compute the Algebraic Immunity of Boolean Functions -- Weighted Unranked Tree Automata...”Enlace del recurso
Electrónico
eBook
18
Publicado 2015
Tabla de Contenidos:
“... Selection Based on Set Theory for Web Intrusion Detection System -- 8. FLC Based Adaptive Neuro Fuzzy...”Enlace del recurso
Electrónico
eBook
19
Publicado 2015
Tabla de Contenidos:
“... -- Higher-Order Imperative Programming Languages -- Transfinite Constructions in Classical Type Theory -- A...”Enlace del recurso
Electrónico
eBook
20
Publicado 2005
Tabla de Contenidos:
“... Cognitive Model for Autonomous Agents Based on Bayesian Programming -- A Structural Learning Algorithm...”Enlace del recurso
Electrónico
eBook
- 1
- 2
- Siguiente »
- [2]



