Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
interface security » interfaces security, internal security, interface secure
program microarray » proteome microarray, from microarray, protein microarray
security program » security problems, security proofs, security proof
microarray https » microarrays https, microarray chips, microscopy https
program program » programs program, programming program
interface security » interfaces security, internal security, interface secure
program microarray » proteome microarray, from microarray, protein microarray
security program » security problems, security proofs, security proof
microarray https » microarrays https, microarray chips, microscopy https
program program » programs program, programming program
1
Published 2010
Table of Contents:
“...-learning Approach to Function Approximation -- On the Effectiveness of Gene Selection for Microarray...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... Freshness Based Persistent Assurance Scheme for Secure Scalable Media Distribution -- Cooperative Decision...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Systems -- Evaluation of Security Mechanisms for Virtual Organizations -- Non-Repudiable and Repudiable...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... Integrated Microarray Data -- Using Data Mining for Dynamic Level Design in Games -- A Logic Programming...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Curriculum -- Avatar Augmented Annotation Interface for e-Learning -- Education–Oriented Virtual Environment...”View full text
Electronic
eBook



