Søg alternativer:
communication from » communication fast
exploiting linked » exploiting linkages, exploiting aligned, exploiting fine
exploiting link » exploiting fine, exploiting long, exploiting online
from dimension » flow dimension, first dimension, forms dimension
1
Udgivet 2010
Indholdsfortegnelse: ... Flexibility in Digital Circuit Evolution: Exploiting Undefined Values in Binary Truth Tables -- Evolving...
Få fuldtekst
Electronisk eBog
2
Udgivet 2006
Indholdsfortegnelse: ... of Cooperation -- An Adaptive Approach for the Exploration-Exploitation Dilemma and Its Application to Economic...
Få fuldtekst
Electronisk eBog
3
Udgivet 2015
Indholdsfortegnelse: ... and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework...
Få fuldtekst
Electronisk eBog
4
Udgivet 2005
Fag: ...Computer communication systems....
Få fuldtekst
Electronisk eBog
5
Udgivet 2010
Indholdsfortegnelse: ...-Constant Number of Colors -- Vertex Sparsifiers: New Results from Old Techniques -- PTAS for Weighted Set...
Få fuldtekst
Electronisk eBog
6
Udgivet 2012
Indholdsfortegnelse: ... Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor -- Parallel...
Få fuldtekst
Electronisk eBog
7
Udgivet 2007
Indholdsfortegnelse: ... of Driver Support Functions -- Modelling the Driver in Control -- From Driver Models to Modelling the Driver...
Få fuldtekst
Electronisk eBog
8
Udgivet 2007
Indholdsfortegnelse: ... to and from the Absolute -- Atomic Waves in Private Practice -- A Complementary Opposition: Louis de Broglie...
Få fuldtekst
Electronisk eBog
9
Udgivet 2008
Indholdsfortegnelse: ...The Organization and Delivery of Digital Information -- From ‘‘Boutique’’ to Mass Digitization...
Få fuldtekst
Electronisk eBog
10
Udgivet 2014
Indholdsfortegnelse: ...: characteristics and dimensions -- Key Capabilities of CIOs and IT Managers for Strategic Competitive Advantage: a...
Få fuldtekst
Electronisk eBog
11
Udgivet 2008
Indholdsfortegnelse: ... Taxonomy to Digital Forensics -- Evidence Recovery -- Recovering Data from Failing Floppy Disks...
Få fuldtekst
Electronisk eBog
12
Udgivet 2008
Indholdsfortegnelse: ... -- Identifying and Exploiting Group Learning Patterns for Counterterrorism -- Homeland Insecurity -- Terrorism...
Få fuldtekst
Electronisk eBog
13
Udgivet 2008
Indholdsfortegnelse: ...Keynote Session 1: -- Social and Political Dimensions of Identity -- Workshop: Privacy Exploits...
Få fuldtekst
Electronisk eBog
14
af Sarlin, Peter., Sarlin, Peter.
Udgivet 2014
Indholdsfortegnelse: ...Introduction -- Macroprudential Oversight -- Macroprudential Data -- Data and Dimension Reduction...
Få fuldtekst
Electronisk eBog
15
Udgivet 2015
Indholdsfortegnelse: ...-organization of conceptual spaces from quality dimensions; Paul Vogt -- Conceptual spaces and computing...
Få fuldtekst
Electronisk eBog
16
Udgivet 2008
Indholdsfortegnelse: ... for Transboundary Groundwater Management as an Instrument of Dialogue and Communication -- Transboundary Aquifers...
Få fuldtekst
Electronisk eBog
17
Udgivet 2011
Indholdsfortegnelse: ... Learning? -- Exploiting Geocollaborative Portals for Designing Collaborative e-Learning Pedagogies: a Model...
Få fuldtekst
Electronisk eBog
18
Udgivet 2005
Indholdsfortegnelse: ... and the Intrusion of Non-linguistic Communication into Utterances -- Mobile Phone Talk in Context -- Unsupervised...
Få fuldtekst
Electronisk eBog
19
Udgivet 2015
Indholdsfortegnelse: ... Dimensionality Reduction -- An Ensemble of Cooperative Parallel Metaheuristics for Gene Selection in Cancer...
Få fuldtekst
Electronisk eBog
20
Udgivet 2015
Indholdsfortegnelse: ... Flexibility in Exploiting Economies of Scope on 70-30 Principle – A Case Study of Japanese Electronics...
Få fuldtekst
Electronisk eBog