Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functions computational » function computation, directions computational, section computational
functions computation » function computation, functions composition, function composition
theory coding » theory colin, theory choosing
using theory » nursing theory, queuing theory, testing theory
functions computational » function computation, directions computational, section computational
functions computation » function computation, functions composition, function composition
theory coding » theory colin, theory choosing
using theory » nursing theory, queuing theory, testing theory
1
Table of Contents:
“... -- Language Theory and Semantics -- Computability and Decidability -- Probability, Statistics and Software...”
View full text
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Data Flow...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“.../Dynamic Fault Trees and Event Trees Using Bayesian Networks -- Component Fault Tree Analysis Resolves...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... -- Volume Computation Using a Direct Monte Carlo Method -- Improved Throughput Bounds for Interference-Aware...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... IEEE1394 -- Efficient Measurement of the Eye Blinking by Using Decision Function for Intelligent...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Facing Government Use of Cloud Computing -- Open Source Software (OSS) Adoption Framework for Local...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... in Evolutionary Programming -- A Comparison of GAs Using Penalizing Infeasible Solutions and Repairing Infeasible...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“...Keynote Addresses -- Extreme Computing on the Distributed European Infrastructure...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“...Visual Dictionary Pruning Using Mutual Information and Information Gain -- Mining Telecommunication...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Clustering Approach using WordNet Lexical Categories -- The Study on the Penalty Function of the Insurance...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“... Semidefinite Programming -- Ranks of Hadamard Matrices and Equivalence of Sylvester—Hadamard and Pseudo-Noise...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... Transmitter: A Fast Design Cycle Using OFDM Framework in Bluespec -- SoC -- A Real-Time Programming Model...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... Breakdowns -- Modeling Inoperability Propagation Using Bayesian Networks -- Risk Management -- Resilience...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets...”View full text
Electronic
eBook
17
Published 2014
Table of Contents:
“...-organized Learning in Software Factory: Experiences and Lessons Learned -- Part Methods and Metrics -- Using...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“... Grid -- Network Selection Mechanism for Future Generation Network Using Game Theory Model -- Research...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box...”View full text
Electronic
eBook



