Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
problems programs » problems progress, problems problems
constrained https » constrained hpc, constrained graphs, constrained stress
programs program » programming program
problems programs » problems progress, problems problems
constrained https » constrained hpc, constrained graphs, constrained stress
programs program » programming program
1
Published 2006
Table of Contents:
“...Activity Recognition Via Classification Constrained Diffusion Maps -- Generating and Updating...”View full text
Electronic
eBook
2
Published 2014
Table of Contents:
“... -- Problems of SUMO-Like Ontology Usage in Domain Modelling -- Intelligent Information Systems...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... -- Problems of SUMO-Like Ontology Usage in Domain Modelling -- Intelligent Information Systems...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... Sequences Using Growing Self Organizing Maps -- Audio-Visual Feature Fusion for Speaker Identification...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... and Neural Networks -- Bottom-Up Visual Saliency Using Binary Spectrum of Walsh-Hadamard Transform...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Entity Recognition -- Local Search for Stable Marriage Problems with Ties and Incomplete Lists -- Layered...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... Methods for Constrained-Embedded Devices -- Some Efficient Algorithms for the Final Exponentiation...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Techniques -- A Genetic Programming Environment for System Modeling -- Mining Gene Expression Profiles...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... and Vulnerabilities in Constrained Environments -- Assessing the Economic Loss and Social Impact of Information System...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“...-Constrained Minimum Spanning Tree Problem -- Adaptive Modularization of the MAPK Signaling Pathway Using...”View full text
Electronic
eBook
11
Published 2013
Table of Contents:
“...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... -- Visual Programming with Interaction Nets -- Theoretical Aspects -- Spider Diagrams of Order and a...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“... -- Modeling and Reasoning about Information Quality Requirements -- Detecting and Correcting Outdated...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... Logic to Logic Programs -- Preference Revision Via Declarative Debugging -- Revised Stable Models – A...”View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“... Cryptographic Mechanisms -- Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Intrusion...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Classification -- Unifying Content and Context Similarities of the Textual and Visual Information in an Image...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... on Register-Constrained Inclusion Scheduling -- Hiord: A Type-Free Higher-Order Logic Programming Language...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Pattern Set Discovery Using Linear Programming Boosting -- Discovery of Super-Mediators of Information...”View full text
Electronic
eBook
19
Published 2012
Table of Contents:
“... Binomial Mixture Models -- Constrained Clustering Using SAT -- Two-stage Approach for Electricity...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... Microprocessors: DWT as a Case Study -- Domain Decomposition Methods for PDE Constrained Optimization Problems...”View full text
Electronic
eBook



