Search alternatives:
problems programs » problems progress, problems problems
constrained https » constrained hpc, constrained graphs, constrained stress
programs program » programming program
1
Published 2006
Table of Contents: ...Activity Recognition Via Classification Constrained Diffusion Maps -- Generating and Updating...
View full text
Electronic eBook
2
Published 2014
Table of Contents: ... -- Problems of SUMO-Like Ontology Usage in Domain Modelling -- Intelligent Information Systems...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... -- Problems of SUMO-Like Ontology Usage in Domain Modelling -- Intelligent Information Systems...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... Sequences Using Growing Self Organizing Maps -- Audio-Visual Feature Fusion for Speaker Identification...
View full text
Electronic eBook
5
Published 2014
Table of Contents: ... and Neural Networks -- Bottom-Up Visual Saliency Using Binary Spectrum of Walsh-Hadamard Transform...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Entity Recognition -- Local Search for Stable Marriage Problems with Ties and Incomplete Lists -- Layered...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... Methods for Constrained-Embedded Devices -- Some Efficient Algorithms for the Final Exponentiation...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... Techniques -- A Genetic Programming Environment for System Modeling -- Mining Gene Expression Profiles...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... and Vulnerabilities in Constrained Environments -- Assessing the Economic Loss and Social Impact of Information System...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ...-Constrained Minimum Spanning Tree Problem -- Adaptive Modularization of the MAPK Signaling Pathway Using...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... -- Visual Programming with Interaction Nets -- Theoretical Aspects -- Spider Diagrams of Order and a...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ... -- Modeling and Reasoning about Information Quality Requirements -- Detecting and Correcting Outdated...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... Logic to Logic Programs -- Preference Revision Via Declarative Debugging -- Revised Stable Models – A...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ... Cryptographic Mechanisms -- Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Intrusion...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Classification -- Unifying Content and Context Similarities of the Textual and Visual Information in an Image...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... on Register-Constrained Inclusion Scheduling -- Hiord: A Type-Free Higher-Order Logic Programming Language...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Pattern Set Discovery Using Linear Programming Boosting -- Discovery of Super-Mediators of Information...
View full text
Electronic eBook
19
Published 2012
Table of Contents: ... Binomial Mixture Models -- Constrained Clustering Using SAT -- Two-stage Approach for Electricity...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... Microprocessors: DWT as a Case Study -- Domain Decomposition Methods for PDE Constrained Optimization Problems...
View full text
Electronic eBook