1
Published 2006
Table of Contents: ... QUALITATIVE SPATIAL REASONING -- ICA-SCS DENOISING METHOD FOR WATERMARKING SCHEME -- STUDY AND IMPLEMENTATION...
View full text
Electronic eBook
2
by Albert, Jim., Albert, Jim.
Published 2007
Table of Contents: ... -- to Bayesian Computation -- Markov Chain Monte Carlo Methods -- Hierarchical Modeling -- Model Comparison...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... -- Implementation and Evaluation of the Mechanisms for Low Latency Communication on DIMMnet-2 -- Computationally...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ...: Distributed Computing and Algorithms I -- Programmer-Centric Conditions for Itanium Memory Consistency -- A...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ...: Part 3. Computational Studies.-Part IV: Control and Uncertain Systems Newton’s Method and Secant Method...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Approach to Learning from Data with Imprecise Labels -- A K-Nearest Neighbours Method Based on Lower...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ...-Biology -- Speedup Analysis for Parallel Implementation of Model of Response Accuracy and Response Time...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... -- Algebraic Identification of MIMO SARX Models -- Contract-Based Design for Computation and Verification of a...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... System -- Evolution of Synaptic Delay Based Neural Controllers for Implementing Central Pattern...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Modeling via Probabilistic Nodes Combination -- Computer-Aided System for Automatic Classification...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... Algorithm -- A Soft-computing Based Approach to Economic and Environmental Analysis of an Autonomous Power...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ... in Cryptography -- Credentials-Based Authorization: Evaluation and Implementation -- Subexponential Parameterized...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... Asynchronous Approximate Dynamic Programming -- Do Agents Make Model Checking Explode (Computationally...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ... Conversational Calculator Based on Remote Online Computation -- Load Forecasting Accuracy through Combination...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ...Sequence Analysis -- Automated Methods of Predicting the Function of Biological Sequences Using GO...
View full text
Electronic eBook
16
Table of Contents: ... of MLD Systems -- 10.4 Piecewise Affine Systems -- 10.5 Exercises -- 11 Fast Methods for Implementing...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... on Network Coding -- Implementation Method for Class J Power Amplifiers -- Paerosols’ Statistical Fractal...
View full text
Electronic eBook
18
by Vankka, Jouko., Vankka, Jouko.
Published 2005
Table of Contents: ...1. Transmitters -- 2. Power Amplifier Linearization -- 3. Digital Compensation Methods for Analog I...
View full text
Electronic eBook