1
Table of Contents: ...Introduction -- Problem Solving: Practical Examples and Additional Properties -- The Problem...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... -- Automated Tag Tracking Using Gabor Filter Bank, Robust Point Matching, and Deformable Models -- Strain...
View full text
Electronic eBook
3
Subjects: ...Programming Languages, Compilers, Interpreters. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
4
Table of Contents: ...Preface -- VI. Integral Calculus in One Variable - 1. Step Continuous Functions - 2. Continuous...
View full text
Electronic eBook
5
Table of Contents: ... -- Multidimensional Scalar Conservation Laws -- The Riemann Problem for Systems -- Existence of Solutions...
View full text
Electronic eBook
6
Published 2014
Table of Contents: ...Introduction. - Wildlife Tracking Data Management: Chances Come from Difficulties -- Storing...
View full text
Electronic eBook
7
by Bachman, David., Bachman, David.
Published 2006
Subjects: ...Real Functions. https://scigraph.springernature.com/ontologies/product-market-codes/M12171...
View full text
Electronic eBook
8
Table of Contents: ...Introduction -- Moving Object Detection and Tracking in Videos -- A Software Approach...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... Data -- Video Tracking Association Problem Using Estimation of Distribution Algorithms in Complex...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... of Ant Algorithm Variants to Single Track Railway Scheduling Problem -- An ICA Mixture Model Based...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... in a Decision Making Problem by Preference Relation -- RBHR: Region-Based Hybrid Routing Protocol...
View full text
Electronic eBook
12
Published 2015
Table of Contents: ... for the Heisenberg Group -- The abc-problem for Gabor Systems and Uniform Sampling in Shift-invariant spaces...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ...Hash Function Cryptanalysis -- Security of MD5 Challenge and Response: Extension of APOP Password...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... -- Design and Analysis of Password-Based Key Derivation Functions -- Pairings -- A New Two-Party Identity...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... for Solving Hard Problems -- Finding Shortest Lattice Vectors in the Presence of Gaps -- A Simple and Improved...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...
View full text
Electronic eBook
19
by Sack, Joseph., Sack, Joseph.
Published 2008
Table of Contents: ...Select -- Perform, Capture, and Track Data Modifications -- Transactions, Locking, Blocking...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ... II -- The Shortest Path Problem Under Partial Monitoring -- Tracking the Best Hyperplane with a...
View full text
Electronic eBook