Poišči alternative:
extension based » extensions based, extrusion based, intension based
extension case » extension a, extension area, extension act
1
2
od Le, Ngoc Thach
Izdano 2008
... is the relationship between the individual factors and extension agents' performance? (5) What factors most influence...
Polni tekst
Thesis
3
Kazalo: ...-class Classification Problems.-K-class Linear Programming Support Vector Classification Regression...
Polni tekst
Elektronski eKnjiga
4
... with a 1×4 linear array antenna, generating four beams with exceptional isolation and transmission...
Polni tekst
Article
5
Izdano 2014
Kazalo: ... in the classical risk model (Ragulina).Part V: Statistics.-Asymptotic properties of drift parameter estimator based...
Polni tekst
Elektronski eKnjiga
6
od Shi, Xizhi., Shi, Xizhi.
Izdano 2011
Kazalo: ...) and Feature Extraction -- Chapter 5. Non-Linear ICA -- Chapter 6. Convolutive Mixture and Blind Deconvolution...
Polni tekst
Elektronski eKnjiga
7
Izdano 2010
Kazalo: ... Communication and Computation -- The Round Complexity of Verifiable Secret Sharing: The Statistical Case...
Polni tekst
Elektronski eKnjiga
8
Izdano 2006
Kazalo: ...Stream Ciphers -- Algebraic Attacks on Clock-Controlled Stream Ciphers -- Cache Based Power...
Polni tekst
Elektronski eKnjiga
9
Izdano 2011
Kazalo: ... Clustering -- On the Analysis of Queues with Heavy Tails: A Non-extensive Maximum Entropy Formalism and a...
Polni tekst
Elektronski eKnjiga
10
Izdano 2008
Kazalo: ... for Clusters -- Parallel Information Theory Based Construction of Gene Regulatory Networks -- Communication...
Polni tekst
Elektronski eKnjiga
11
Izdano 2008
Kazalo: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
Polni tekst
Elektronski eKnjiga
12
Izdano 2007
Kazalo: ... Forensics: Research and Development in Hong Kong (Invited Paper) -- Cryptanalysis -- A Linear Analysis...
Polni tekst
Elektronski eKnjiga
13
Izdano 2008
Kazalo: ...Hash Function Cryptanalysis -- Security of MD5 Challenge and Response: Extension of APOP Password...
Polni tekst
Elektronski eKnjiga
14
Izdano 2015
Kazalo: ... -- 26 Linear Batch Codes: H. Lipmaa and V. Skachek -- 27 An Extension of the Brouwer-Zimmermann Minimum...
Polni tekst
Elektronski eKnjiga
15
Izdano 2010
Kazalo: ... -- Compilation and Runtime Systems -- Split Register Allocation: Linear Complexity Without the Performance...
Polni tekst
Elektronski eKnjiga
16
Izdano 2007
Kazalo: ... and NMAC-MD5 -- Secure Searching -- How Should We Solve Search Problems Privately? -- Public Key Encryption...
Polni tekst
Elektronski eKnjiga
17
Izdano 2005
Kazalo: ... - Best Papers -- Preemption Adaptivity in Time-Published Queue-Based Spin Locks -- Criticality Driven...
Polni tekst
Elektronski eKnjiga
18
Izdano 2014
Kazalo: ... Surfaces.-Computation Method of Processing Time based on BP Neural Network and Genetic Algorithm...
Polni tekst
Elektronski eKnjiga
19
Izdano 2010
Kazalo: ... of Reachability in Randomized Sabotage Games -- Applying Step Coverability Trees to Communicating Component-Based...
Polni tekst
Elektronski eKnjiga
20
Izdano 2010
Kazalo: ... -- Session 2. Model Checking and Automata -- Simulation Subsumption in Ramsey-Based Büchi Automata...
Polni tekst
Elektronski eKnjiga