Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
developing computers » developing computer, developing competent, developing competence
https developing » hits developing, steps developing, crops developing
computers https » computers gtt, computers help
graphs » graphics
developing computers » developing computer, developing competent, developing competence
https developing » hits developing, steps developing, crops developing
computers https » computers gtt, computers help
graphs » graphics
1
Published 2006
Table of Contents:
“...Treewidth: Characterizations, Applications, and Computations -- Locally Injective Graph...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Graphs, via Well-Orderly Maps and Trees -- Efficient Computation of the Lovász Theta Function for a Class...”View full text
Electronic
eBook
3
Table of Contents:
“...Introduction -- Part I: Fundamental Algorithms -- Graphs -- The Computational Model -- Spanning...”
View full text
View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... -- Toposes Are Adhesive -- Extensions for Distributed and Global Computing -- Graph Transactions as Processes...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... -- Applications of Graph Transformation -- Mobile Agents Implementing Local Computations in Graphs -- A...”View full text
Electronic
eBook
6
Table of Contents:
“... -- Causal Bond Graphs and Forms of Mathematical Models -- Computing Mathematical Models Derived from Bond...”
View full text
View full text
Electronic
eBook
7
Published 2015
Table of Contents:
“... monoid of subsets of natural integers -- Some reflections on mathematics and its relation to computer...”View full text
Electronic
eBook
8
Table of Contents:
“...Prefaces -- Basic Graph Theory -- Algorithms and Complexity -- Shortest Paths -- Spanning Trees...”
View full text
View full text
Electronic
eBook
9
Table of Contents:
“...Basic Graph Theory -- Algorithms and Complexity -- Shortest Paths -- Spanning Trees -- The Greedy...”
View full text
View full text
Electronic
eBook
10
Published 2005
Table of Contents:
“...On Convex Developments of a Doubly-Covered Square -- Flat 2-Foldings of Convex Polygons -- Uniform...”View full text
Electronic
eBook
11
by de Berg, Mark., de Berg, Mark., Cheong, Otfried., van Kreveld, Marc., Overmars, Mark.
Published 2008
Table of Contents:
“...Computational Geometry: Introduction -- Line Segment Intersection: Thematic Map Overlay -- Polygon...”Published 2008
View full text
Electronic
eBook
12
Subjects:
“...Biomedicine, general. https://scigraph.springernature.com/ontologies/product-market-codes/B0000X...”
View full text
View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“...Computing The Semantic Information In An Utterance -- Justified Sloppiness In Anaphoric Reference...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... and Computations Solving Phylogenetic and Population Genetic Problems with Missing or Genotypic Data -- Improved...”View full text
Electronic
eBook
15
Published 2006
Table of Contents:
“...Molecular and Membrane Computing Models -- Computing with Spiking Neural P Systems: Traces...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... and Executing Finite Automata in Test Tube -- Development of an In Vivo Computer Based on Escherichia coli...”View full text
Electronic
eBook
17
Published 2011
Table of Contents:
“... Polynomials to the Computation of a Special Hankel Determinant (Paul Barry, Predrag M. Rajković and Marko D...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Functional Cooperation in the Human Brain Using Simple Graph-Theoretic Methods -- Methodological Framework...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... Software Development -- Verifying Fault-Tolerant Distributed Systems Using Object-Based Graph Grammars...”View full text
Electronic
eBook
20
Published 2015
Table of Contents:
“... Exponentiation -- Chapter 9. Computationally Secure Robust Multi-Secret Sharing for General Access Structure...”View full text
Electronic
eBook



