1
Published 2007
Table of Contents: ... -- Survival by Deception -- How to Secure Bluetooth-Based Pico Networks -- Learning from Your Elders: A...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... Games -- Computing Symmetric Boolean Functions by Circuits with Few Exact Threshold Gates...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ...Roadmapping and i-Systems -- Exploring Computational Scheme of Complex Problem Solving Based...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... Facing Government Use of Cloud Computing -- Open Source Software (OSS) Adoption Framework for Local...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... Theorem Proving Method Using Logical Reinforcement Learning -- Gene Expression Programming with DAG...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... -- The Complexity of Boolean Formula Minimization -- Optimal Cryptographic Hardness of Learning Monotone Functions...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... for Supercomputing Applications - DEISA -- Towards Networked Computers: What Can Be Learned from Distributed...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ... Networks to Enhance Customer Lifetime Predictions -- A Note on Machine Learning Approach to Analyze...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... to Understand It -- Part Lessons Learned and Agile Maturity -- Maturing in Agile: What Is It About? -- Why We...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... Grid -- Network Selection Mechanism for Future Generation Network Using Game Theory Model -- Research...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... Hard-to-Invert Leakage -- Completeness for Symmetric Two-Party Functionalities - Revisited...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ...Full Papers -- Verifying the Incorrectness of Programs and Automata -- Generating Admissible...
View full text
Electronic eBook
14
Table of Contents: ... Arithmetic -- Elementary Functions -- Evaluating Floating-Point Elementary Functions -- Solving the Table...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... Simulated Agent -- Learning to Generalize through Predictive Representations: A Computational Model...
View full text
Electronic eBook
16
Published 2007
Table of Contents: ...Data Analysis, Modelling, and Learning -- Taking Class Importance into Account -- Tolerance Based...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... of the Incidence Matrices to Compute the Algebraic Immunity of Boolean Functions -- Weighted Unranked Tree Automata...
View full text
Electronic eBook
18
Published 2015
Table of Contents: ... Selection Based on Set Theory for Web Intrusion Detection System -- 8. FLC Based Adaptive Neuro Fuzzy...
View full text
Electronic eBook
19
Published 2015
Table of Contents: ... -- Higher-Order Imperative Programming Languages -- Transfinite Constructions in Classical Type Theory -- A...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... Cognitive Model for Autonomous Agents Based on Bayesian Programming -- A Structural Learning Algorithm...
View full text
Electronic eBook