1
Published 2015
Table of Contents: ...Bio-inspired Optimization Techniques and Their Applications -- Swarm Based Mean-Variance Mapping...
View full text
Electronic eBook
2
Published 2014
Table of Contents: ... Using Entropy Analysis -- Deriving Composite Periodic Patterns from Database Audit Trails -- Comparison...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... Using Entropy Analysis -- Deriving Composite Periodic Patterns from Database Audit Trails -- Comparison...
View full text
Electronic eBook
4
Published 2014
Table of Contents: ... Optimization Algorithm for Feature Selection of Support Vector Machines; K.-C. Lin, et al -- Using Affective...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... of Humans and Lower Animals: From Biomechanics to Intelligence -- Full Papers -- Prediction of Aircraft...
View full text
Electronic eBook
6
7
Published 2005
Table of Contents: ... Recognition from Tracked Face Displacements -- 2 – Affective Computing (AC 2005) -- Adaptation and Decision...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ...-Learning Issues under an Affective Perspective -- Recommendation in Education Portal by Relation Based...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... Search for Deferential Evolution in Continuous Optimization -- Learning from Play: Facilitating character...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... and Perception of Speech Rate -- Using Gradient Descent Optimization for Acoustics Training from Heterogeneous...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ...An Overlapping Communication Protocol Using Improved Time-Slot Leasing for Bluetooth WPANs -- Full...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... Intellectual Undertaking -- Measuring Attractiveness of Rules from the Viewpoint of Knowledge Representation...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Method Based on Received Signal Strength -- Optimization of the Switches in Storage Networks -- Migration...
View full text
Electronic eBook
15
Published 2013
Table of Contents: ...: an All-in-one Tool for Extraction and Aggregation of underlying Social Networks from Relational Databases...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... -- Semantics for the Asynchronous Communication in LIPS, a Language for Implementing Parallel/distributed...
View full text
Electronic eBook