Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
computing programming » computer programming, computers programming
detection computing » detection comparing, detection computer, detection combining
programming systems » programming system, programming series, programming problems
systems arrays » systems array, systems always, systems assays
arrays via » arrays a
computing programming » computer programming, computers programming
detection computing » detection comparing, detection computer, detection combining
programming systems » programming system, programming series, programming problems
systems arrays » systems array, systems always, systems assays
arrays via » arrays a
1
Published 2005
Table of Contents:
“... and Corpus Transformation to a Chunking Task -- Extracting Computer Algebra Programs from Statements...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“...Memory-Constrained Communication Minimization for a Class of Array Computations -- Forward...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Network on Chip -- System Modeling and Simulation -- Communication Architecture Simulation on the Virtual...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... for Detecting Bugs in Concurrent Programs -- Automatically Proving Linearizability -- Model Checking...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“...EvoCOMNET Contributions -- Detection of DDoS Attacks via an Artificial Immune System-Inspired...”View full text
Electronic
eBook
6
Published 2013
Table of Contents:
“... Array-Based Systems with Applications to Security-Aware Workflows -- Presburger Arithmetic in Memory...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... -- Solving First Order Formulae of Pseudo-Regular Theory -- Splicing Array Grammar Systems -- Computer...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“... in Scientific Numeric Computing -- Fast Parallel Suffix Array on the GPU -- Effective Barrier Synchronization...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... for Flat Array Properties -- SATMC: A SAT-Based Model Checker for Security-Critical Systems -- IC3 Modulo...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Programs with Arrays -- Property-Driven Partitioning for Abstraction Refinement -- Combining Abstraction...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“... of the Anticipatory Reflexes of a Computational Model of the Cerebellum -- Evolving Optimal Swimming in Different...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“... Order Lu System via Optimal PIλDμ Controller with Artificial Bee Colony Algorithm -- Cooperative Micro...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... -- Intensional Encapsulations of Database Subsets via Genetic Programming -- Preferred Skyline: A Hybrid Approach...”View full text
Electronic
eBook
14
Published 2013
Table of Contents:
“... Programming Based Method for Joint Object Region Matching and Labeling -- Using Models of Objects...”View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“...-EMF Detection -- Establishment of the Photovoltaic Simulation System using Mixed Programming...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“...EternalS: Mission and Roadmap -- to the EternalS Track: Trustworthy Eternal Systems via Evolving...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... -- Pressure Is a Viable Controlled Output of Motor Programming for Object Manipulation Tasks -- Performance...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... -- Linear Coherent Bi-cluster Discovery via Beam Detection and Sample Set Clustering -- An Iterative...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... -- Intrusion Detection via Analysis and Modelling of User Commands -- Dynamic Schema Navigation Using Formal...”View full text
Electronic
eBook



