Search alternatives:
programming security » programming secrets, programming secure, programming recursion
security microarray » series microarray
using programming » using programmable, computing programming
microarray https » microarrays https, microarray chips, microscopy https
1
Published 2007
Table of Contents: ... -- Constraints Solution for Time Sensitive Security Protocols -- Using Bit Selection to Do Routing Table Lookup...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... for Mining Subtle Signals in Time Course Microarray Data -- A PTAS for the k-Consensus Structures Problem...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Collaborative Teaching Approach Using Integrated Electronic Environments for Information Security -- Research...
View full text
Electronic eBook
4
Published 2007
Table of Contents: ... for Screening of Oral Cancer Using Laser Induced Fluorescence -- Tongueprint Feature Extraction and Application...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Integrated Microarray Data -- Using Data Mining for Dynamic Level Design in Games -- A Logic Programming...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... Microarray Experiments to Pathway Analysis Through the Use of Gene Ontology Terms -- Gene Expression Analysis...
View full text
Electronic eBook