Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming secure » programming security, programming secrets, programming feature
using programming » using programmable, computing programming
secure microarray » structure microarray, molecule microarray, gene microarray
microarray https » microarrays https, microarray chips, microscopy https
programming secure » programming security, programming secrets, programming feature
using programming » using programmable, computing programming
secure microarray » structure microarray, molecule microarray, gene microarray
microarray https » microarrays https, microarray chips, microscopy https
1
Published 2007
Table of Contents:
“... -- Constraints Solution for Time Sensitive Security Protocols -- Using Bit Selection to Do Routing Table Lookup...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“... for Mining Subtle Signals in Time Course Microarray Data -- A PTAS for the k-Consensus Structures Problem...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Collaborative Teaching Approach Using Integrated Electronic Environments for Information Security -- Research...”View full text
Electronic
eBook
4
Published 2007
Table of Contents:
“... for Screening of Oral Cancer Using Laser Induced Fluorescence -- Tongueprint Feature Extraction and Application...”View full text
Electronic
eBook
5
Published 2005
Table of Contents:
“... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Integrated Microarray Data -- Using Data Mining for Dynamic Level Design in Games -- A Logic Programming...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... Microarray Experiments to Pathway Analysis Through the Use of Gene Ontology Terms -- Gene Expression Analysis...”View full text
Electronic
eBook



