Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
program functionality » protein functionality, programs functional, supra functionality
functionality adding » functionality using, functionality amino, functionality setting
parallel mining » parallel thinning, parallel imaging, parallel finite
mining program » winning program, linking program, ringing program
adding https » aging https, auditing https, banking https
program functionality » protein functionality, programs functional, supra functionality
functionality adding » functionality using, functionality amino, functionality setting
parallel mining » parallel thinning, parallel imaging, parallel finite
mining program » winning program, linking program, ringing program
adding https » aging https, auditing https, banking https
1
Published 2005
Table of Contents:
“... Computing Environment -- GOP: A Graph-Oriented Programming Model for Parallel and Distributed Systems...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“... of a Novel Integer Programming Model to Deal with Energy Consumption in Heterogeneous Wireless Sensor...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... -- Exploring Hierarchical Rule Systems in Parallel Coordinates -- Bayesian Networks Learning for Gene...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Thinking Skills for Deaf Children -- Parallelization of Shape Function Generation for Hierarchical...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... Parallelization in HPF Programs on the Earth Simulator -- Sampling of Protein Conformations with Computers...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... and Multicasting in Static Wireless Ad Hoc Networks -- An Algorithm for Nonconvex Lower Semicontinuous Optimization...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... of Emerging Parallel Media Mining Workloads -- Efficient PDM Sorting Algorithms -- Accelerating Cone Beam...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“... Rules Based on Extended Function Dependency -- A Problem Oriented Approach to Data Mining in Distributed...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... Bluetooth Based Autonomous Mining System -- Transistor Representation of a Low Power Reversible 32-Bit...”View full text
Electronic
eBook
11
Published 2007
Table of Contents:
“... Execution of Parallel Processes: Penetrating NATs over the Grid -- Parallelization of C# Programs Through...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Mechanics -- A Hybrid Parallel Algorithm for Transforming Finite Element Functions from Adaptive...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... -- Adding Fault-Tolerance Using Pre-synthesized Components -- Efficiency of Dynamic Arbitration in TDMA...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... -- Some Modifications of Bucket-Based Algorithms for Query Rewriting Using Views -- Data Mining...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... for Mining Multi-attribute Dependencies -- Frequent Pattern Mining with Preferences–Utility Functions...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“... Image Feature Tag Adding Functions -- The Impact of the Malfunction of a Sector in Supply Chain...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“...Customized Opinion Mining using Intelligent Algorithms -- Information Security Measurement Roles...”View full text
Electronic
eBook
18
Published 2015
Table of Contents:
“... for Generating RWG Function -- Internal AC Fault of Converter Station Based on Modular Multilevel Converter High...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Ad Hoc Eavesdropping Algorithm Based...”View full text
Electronic
eBook
20
Published 2015
Table of Contents:
“... Programming Platform for MPI and PVM -- 13. Association Rule Mining and Refinement Using Shared Memory...”View full text
Electronic
eBook



