Search alternatives:
generation euclidean » enumeration euclidean, generalized euclidean, generation euler
communication based » communication between
based generation » based integration, third generation, based genetic
euclidean link » euclidean plane, euclidean point, euclidean rings
1
Published 2013
Table of Contents: ... Network -- A Jini Based Implementation for Best Leader Node Selection in MANETs -- A Novel Methodology...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... Genetic Algorithm Based Test Case Generation Using Sequence Diagrams -- LACAIS: Learning Automata Based...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... Communication -- Embodied Conversational Agents: Computing and Rendering Realistic Gaze Patterns -- DBN Based...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Cryptosystem Based upon Euclidean Addition Chains -- Optimal Authentication Codes from Difference Balanced...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Complexity -- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... Architecture for Euclidean Metric-Based Hausdorff Distance Measures Between Images -- Session IV - Applications...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ...The Animat Approach to Adaptive Behaviour -- Extended Homeostatic Adaptation: Improving the Link...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... Clusters from Non-Euclidean Dissimilarity Matrix by Using Rough Clustering -- Towards Ontologies...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ... -- Artificial Intelligence in Transportation Systems -- A Column Generation Based Heuristic for a Bus Driver...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... and Complexity -- Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem -- Encapsulated...
View full text
Electronic eBook
12
Published 2015
Table of Contents: ... for Mobile Ad Hoc Networks -- 17. Weighted Euclidean Distance Based Sign Language Recognition Using Shape...
View full text
Electronic eBook