Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
computational programming » computation programming, computational program, computing programming
detection computational » section computational, prediction computational, interactions computational
programming semantics » programming mathematics, programming series, programming secrets
semantics cross » semantics across, semantics cost, semantics from
cross various » across various, from various, tools various
computational programming » computation programming, computational program, computing programming
detection computational » section computational, prediction computational, interactions computational
programming semantics » programming mathematics, programming series, programming secrets
semantics cross » semantics across, semantics cost, semantics from
cross various » across various, from various, tools various
1
Published 2010
Table of Contents:
“... by Exploiting Domain Models and Lexical Substitution -- Efficient Semantic-Aware Detection of Near Duplicate...”View full text
Electronic
eBook
2
Published 2014
Table of Contents:
“... Computational Model to Find Semantic Similarity -- Energy Efficient Cluster Based Aggregation Protocol (EECAP...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Constrained Minimum Cost -- Efficient Deadlock Detection in Parallel Computer Systems with Wormhole Routing...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Helps Casual Process Modelers -- SPEED: A Semantics-Based Pipeline for Economic Event Detection...”View full text
Electronic
eBook
5
Published 2013
Table of Contents:
“... Surface: What Can We Gain from Computational Chemistry.- Modeling the Intermolecular Interactions...”View full text
Electronic
eBook
6
Published 2014
Table of Contents:
“... -- An Evaluation of Reliability of a Two-Unit Degradable Computing System using Parametric Non-Linear Programming...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... -- Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach -- SPECS: Secure...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Performance Computing -- Trust Worthy Architecture for Mobile Ad Hoc Network Environment -- A Cross Layer...”View full text
Electronic
eBook



