Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
communication information » communication international, communication education
extensions exploiting » expansion exploiting, extensions supporting, explanations exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
communication information » communication international, communication education
extensions exploiting » expansion exploiting, extensions supporting, explanations exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
1
Pubblicazione 2008
Sommario:
“... System Detection -- De-triangulation Optimal Solutions for Mobility Scenarios with Asymmetric Links...”Testo
Elettronico
eBook
2
Advances in Multimedia Information Processing - PCM 2005 6th Pacific Rim Conference on Multimedia...
Pubblicazione 2005
Sommario:
“... Method with Virtual Source Location Information -- A System for Detecting and Tracking Internet News...”Testo
Elettronico
eBook
3
Pubblicazione 2006
Sommario:
“... Protection Overlay -- An Extensible and Flexible System for Network Anomaly Detection -- Design...”Testo
Elettronico
eBook
4
Pubblicazione 2005
Sommario:
“... Tool for Relation Extraction from Text in Ontology Extension -- Containment and Minimization of RDF...”Testo
Elettronico
eBook
5
Pubblicazione 2010
Sommario:
“... -- From IT Governance to Enterprise Governance of IT: A Journey for Creating Business Value Out...”Testo
Elettronico
eBook
6
Pubblicazione 2008
Sommario:
“... of Component Controllers -- Analysis of Component Model Extensions to Support the GriCoL Language -- Resource...”Testo
Elettronico
eBook
7
Pubblicazione 2008
Sommario:
“... NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault...”Testo
Elettronico
eBook
8
Pubblicazione 2006
Sommario:
“... Exploiting a Hierarchical Fuzzy Categorization -- Query Phrase Suggestion from Topically Tagged Session Logs...”Testo
Elettronico
eBook
9
Pubblicazione 2013
Sommario:
“... and Subgraph Clusters in Graphs with Feature Vectors -- Exploiting Temporal Information in a Two-Stage...”Testo
Elettronico
eBook
10
Pubblicazione 2008
Sommario:
“... with Multi-seeds Detection and Parallel Extension -- Highly Space Efficient Counters for Perl Compatible...”Testo
Elettronico
eBook
11
Pubblicazione 2005
Sommario:
“... Communication Devices -- CORDIC-Augmented Sandbridge Processor for Channel Equalization -- Power-Aware Branch...”Testo
Elettronico
eBook
12
Pubblicazione 2015
Sommario:
“... Techniques For Rare Patterns Detection in the Industrial Field -- Strategic Decision-making from...”Testo
Elettronico
eBook



