Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
exploiting programming » exploring programming, evaluating programming, existing programming
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
computer microarray » colour microarray, comparing microarray
microarray https » microarrays https, microarray chips, microscopy https
exploiting programming » exploring programming, evaluating programming, existing programming
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
computer microarray » colour microarray, comparing microarray
microarray https » microarrays https, microarray chips, microscopy https
1
Published 2007
Table of Contents:
“... Between Protein and RNA -- Detecting Periodically Expression in Unevenly Spaced Microarray Time Series...”View full text
Electronic
eBook
2
Published 2015
Table of Contents:
“...A Discrete Event System Based Approach for Obfuscated Malware Detection -- Quantification...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... Modeling via Probabilistic Nodes Combination -- Computer-Aided System for Automatic Classification...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Structure Theory -- Exploiting Ontological Structure for Complex Preference Assembly -- Constraints -- A...”View full text
Electronic
eBook
5
Published 2006
Table of Contents:
“... Logic Programming -- A Method for Characterizing Tractable Subsets of Qualitative Fuzzy Temporal...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Automata -- A Gradient BYY Harmony Learning Algorithm on Mixture of Experts for Curve Detection -- A Novel...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... Diagnosis System Using Hybrid Data Mining -- Computer Network Monitoring and Abnormal Event Detection Using...”View full text
Electronic
eBook



