Search alternatives:
communication based » communication between
based dimensions » based dimension, basic dimensions, based dimensioning
session 3a » session 3, session _, session 2
session 2a » session 2, session _, session 1
1
Published 2010
Table of Contents: ... Physics -- A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... Attack -- Perceptual Depth Estimation from a Single 2D Image Based on Visual Perception Theory -- A...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Digital Circuits Using Complex Building Blocks -- Session 2: Artificial Development -- Fault Tolerance...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... -- Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates -- Extending UML 2...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... -- On the Scalability of Fluid Models of IP Networks Loaded by Long-lived TCP Flows -- The Optimal Dimensioning Of Multi...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... Challenges in a Multi-Domain and Multi-Technology Network Environment -- Rule-Based Advertisement...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... Management Using Machine Learning -- Session 2: Fault Detection and Diagnosis -- Probabilistic Fault...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... -- The EvA2 Optimization Framework -- Special Session: LION-CCEC -- Feature Extraction from Optimization Data...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... -- Two-Channel-Based Noise Reduction in a Complex Spectrum Plane for Hands-Free Communication System...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ...-based Visualization of Ontologies -- LSD Dimensions: Use and Reuse of Linked Statistical Data...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... Partitioning Of Problems Through Submodel Decomposition— A Promising Technique Of Det -- Session 2 Distributed...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... for ECHO and Grøstl -- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ... for a Paradigm Shift in Addressing Privacy Risks in Social Networking Applications -- Keynote Session 3...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Algorithms -- A New Pairwise Comparison Based Method of Ranking LR-fuzzy Numbers -- A Fuzzy Assessment Model...
View full text
Electronic eBook