1
Published 2015
Table of Contents: ... Rehabilitation Process; S.Salim, et al -- A Security Protocol based-on Mutual Authentication Application toward...
View full text
Electronic eBook
2
Published 2013
Table of Contents: ...What is the Value of Information – Search Engine’s Point of View -- Application of Combined...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... Data -- Creation, Population and Preprocessing of Experimental Data Sets for Evaluation of Applications...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... with Preprocessing -- Games, Time, and Probability: Graph Models for System Design and Analysis -- Agreement...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ...Invited Papers -- Parsing and Real-World Applications -- Knowledge for Everyman -- Evolution...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... -- Intervals, Syzygies, Numerical Gröbner Bases: A Mixed Study -- Application of Computer Algebra...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ... of Simplex Decomposition Trees -- Applications -- Patient-Specific Vascular NURBS Modeling for Isogeometric...
View full text
Electronic eBook
9
Published 2013
Table of Contents: ...An Algorithm for Enumerating Maximal Models of Horn Theories with an Application to Modal Logics...
View full text
Electronic eBook
10
Published 2012
Table of Contents: ... to Explore Functional Genomics Data Sets in NCBI’s GEO Database.-Analyzing Cancer Samples with SNP Arrays...
View full text
Electronic eBook
11
Published 2012
Table of Contents: ... for Detection of Macula in Fundus Images -- The Brain’s Sequential Parallelism: Perceptual Decision-Making...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... for Axis-Parallel Rectangles -- Single Machine Precedence Constrained Scheduling Is a Vertex Cover Problem...
View full text
Electronic eBook