Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
communication information » communication international, communication education
information formal » information form, information forest, information forum
design exploiting » design exploring, design explorations, design exploration
exploiting link » exploiting fine, exploiting long, exploiting online
formal design » form design, trial design, factorial design
communication information » communication international, communication education
information formal » information form, information forest, information forum
design exploiting » design exploring, design explorations, design exploration
exploiting link » exploiting fine, exploiting long, exploiting online
formal design » form design, trial design, factorial design
1
Published 2010
Table of Contents:
“...Invited Talks -- Fostering Proof Scores in CafeOBJ -- Exploiting Partial Success in Applying...”View full text
Electronic
eBook
2
Natural Language and Information Systems 13th International Conference on Applications of Natural...
Published 2008
Table of Contents:
“... -- Automating the Generation of Semantic Annotation Tools Using a Clustering Technique -- Information Retrieval...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... -- Resources for Situated Actions -- An Architecture and a Formal Description Technique for the Design...”View full text
Electronic
eBook
4
Natural Language Processing and Information Systems 12th International Conference on Applications...
Published 2007
Table of Contents:
“... Time Complexities for Filtering Spam Messages -- Semantic Annotation -- Exploit Semantic Information...”View full text
Electronic
eBook
5
Knowledge-Based and Intelligent Information and Engineering Systems 14th International Conference...
Published 2010
Table of Contents:
“... Symbiotic Systems -- Embracing Uncertainty: The New Machine Intelligence -- Exploiting Social Structures...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“...: An Evolutionary Approach -- Flexible Information Systems Development: Designing an Appropriate Methodology...”View full text
Electronic
eBook
7
Published 2011
Table of Contents:
“... Clustering -- On the Analysis of Queues with Heavy Tails: A Non-extensive Maximum Entropy Formalism and a...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Embedded Systems -- Error-Exploiting Video Encoder to Extend Energy/QoS Tradeoffs for Mobile Embedded...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Ontologies -- Towards a Formal Verification of OWL-S Process Models -- Web Service Composition with Volatile...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... by Exploiting Semantic Relationships -- Using Fuzzy Conceptual Graphs to Map Ontologies -- Formalism-Independent...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... -- Load Information Sharing Policies In Communication-Intensive Parallel Applications -- A markov model...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Exploiting OPPL and OWL-API -- Experimenting with eXtreme Design -- Social Aspects and Tagging -- Weaving a...”View full text
Electronic
eBook
13
Published 2012
Table of Contents:
“... Learner Modeling -- Technology-Embraced Informal-in-Formal-Learning -- Towards Automatic Competence...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... -- VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 -- Performance Comparison...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“...Knowledge-Based Systems -- Platform-Based Product Design and Development: Knowledge Support...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Information Systems and Formal Semantics of Programming Languages -- Applications and Case Studies -- Modeling...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management...”View full text
Electronic
eBook
18
19
Published 2006
Table of Contents:
“... Computing -- Exploiting Eye Gaze Information for Operating Services in Home Network System -- A Methodology...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“... for Multilingual Resource Development and Intercultural Communication -- Exploiting Aligned Parallel Corpora...”View full text
Electronic
eBook



